Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
profile
Poorvi Vora
electronic voting
Cryptography
Cryptographic Protocols
District of Columbia
file
Measuring Protocol Strength with Security Goals
Submitted by akarns on Tue, 01/26/2016 - 2:52pm. Contributors:
Paul Rowe
Joshua D. Guttman
Moses Liskov
Presented as part of the
2016 HCSS conference
.
Cryptographic Protocols
Measuring Security
Metrics
High Confidence Software and Systems Conference 2016
Presentation
HCSS 2016
biblio
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
Submitted by Anonymous on Mon, 12/07/2015 - 3:40pm
mobile ad hoc networks
telecommunication traffic
telecommunication security
secret verification message routing
Routing protocols
Routing
Public key
onion routing
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
AASR protocol
MANET
key-encrypted onion routing
fake routing packets
denial-of-service broadcasting
Cryptographic Protocols
authenticated routing
authenticated anonymous secure routing protocols
anonymous routing
adversarial environments
Ad hoc networks
biblio
Identity-based remote data possession checking in public clouds
Submitted by BrandonB on Wed, 05/06/2015 - 1:45pm
certificate management elimination
Cloud Computing
cloud server
Cryptographic Protocols
data outsourcing
ID-RDPC protocol
identity-based RDPC protocols
identity-based remote data possession checking protocol
PKI setting
public cloud storage
public key cryptography
public key infrastructure
spam
standard computational Diffie-Hellman problem
storage management
unsolicited e-mail
biblio
A group-based security protocol for Machine Type Communications in LTE-Advanced
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
LTE-advanced communication
telecommunication security
software verification tool
single authentication server overhead
signalling protocols
signaling congestion reduction
radio access networks
Protocols
performance evaluation
MTC
mobility management (mobile radio)
machine type communication
access network
Long Term Evolution
handover delay
Handover
group-based security protocol
delays
Cryptographic Protocols
computer science
authentication and key agreement
authentication
AKA
biblio
Cryptanalysis of a Remote User Authentication Protocol Using Smart Cards
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
message authentication
Yung-Cheng-Lee's protocol
verification table
user impersonation attack
smart cards
Smart card
session key
Servers
server impersonation attack
remote user authentication protocol
Protocols
password change phase
authentication
legitimacy verification
insider attacks
insecure channel
dynamic id
denial-of-service attack
Cryptography
Cryptographic Protocols
cryptanalysis
computer network security
Bismuth
biblio
Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
polynomial-time computable function
wireless security
wireless devices
Wireless communication
wireless channels
wireless channel characteristics
transport protocols
security
Protocols
Probes
private communications
privacy preserving password verification
1-out-of-2 oblivious transfer protocol
physical channel characteristics
Oblivious transfer
data privacy
Cryptography
cryptographic tools
Cryptographic Protocols
cryptographic protocol
computational complexity
computational assumptions
Communication system security
Channel estimation
biblio
Identity-Based Distributed Provable Data Possession in Multicloud Storage
Submitted by BrandonB on Wed, 05/06/2015 - 1:43pm
Indexes
bilinear pairings
CDH problem
Cloud Computing
computational Diffie-Hellman problem
Computational modeling
Cryptographic Protocols
data integrity
delegated verification
distributed computing
Distributed databases
formal system model
formal verification
ID-DPDP protocol
identity-based cryptography
identity-based distributed provable data possession
storage management
integrity checking protocol
multicloud servers
multicloud storage
outsourced data
private key cryptography
private verification
Protocols
provable data possession
public key cryptography
public verification
remote data integrity checking model
security
security model
Servers
biblio
Verification of DNSsec Delegation Signatures
Submitted by BrandonB on Wed, 05/06/2015 - 1:43pm
interactive theorem prover
Theorem Proving
Servers
security protocol verification
Public key
Protocols
model checking analysis
Isabelle/HOL
Isabelle-HOL
IP networks
internet
authentication
inference mechanisms
inductive approach
formal verification
DNSsec protocol
DNSsec delegation signatures
DNSsec
delegation signatures
Cryptographic Protocols
chain of trust
biblio
Formal Verification of Wireless Sensor Key Exchange Protocol Using AVISPA
Submitted by BrandonB on Wed, 05/06/2015 - 1:43pm
IP-based wireless sensor networks
WSNs
wireless sensor networks
wireless sensor key exchange protocol
Wireless communication
security
Protocols
lightweight key exchange protocol WSKE
IPSEC-6LoWPAN networks
IPsec
authentication
IP networks
Internet key exchange version 2 mechanism
internet
IKEv2
formal verification
end-to-end security
Cryptographic Protocols
Communication system security
AVISPA
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
next ›
last »