Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Key Management for Static Wireless Sensor Networks With Node Adding
Submitted by BrandonB on Wed, 05/06/2015 - 12:44pm
random processes
wireless sensor networks (WSNs)
wireless sensor networks
transitory master key
telecommunication security
telecommunication network management
symmetric key management scheme
symmetric encryption
static wireless sensor network
security threat
secure communication
random seed distribution
Cryptographic Protocols
random key distribution
Protocols
protocol
Materials
Knowledge engineering
key management
Informatics
hardware tampering
eavesdropping
Cryptography
biblio
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications
Submitted by BrandonB on Wed, 05/06/2015 - 12:35pm
Protocols
Synthetic aperture sonar
smart power grids
smart meter (SM)
smart grid communications
smart grid (SG)
Servers
security
secure remote password protocol
secure remote password (SRP)
public-private key pairs
public key infrastructure
public key cryptography
Public key
authentication
mutual authentication
management overhead
key management protocol
key management
key generator entity
initial password
identity-based cryptography
home networks
home area network
Enhanced identity-based cryptography (EIBC)
Cryptographic Protocols
authorisation
authentication server
biblio
Secure Routing with an Integrated Localized Key Management Protocol in MANETs
Submitted by BrandonB on Wed, 05/06/2015 - 12:33pm
mobile ad hoc network (MANET)
Secure Routing
routing security
Routing protocols
Routing Protocol
Routing
public key cryptography
Public key
neighbor based handshaking and least common multiple
mobile computing
mobile ad hoc networks
Ad hoc networks
mobile ad hoc network
MANET
key management protocol
key management
Intrusion Detection System (IDS)
intrusion detection system
integrated localized key management protocol
Cryptographic Protocols
broadcast key distribution mechanism
authentication
biblio
Towards Scalability for Federated Identity Systems for Cloud-Based Environments
Submitted by BrandonB on Wed, 05/06/2015 - 12:26pm
Scalability
central authentication service
cloud based environments
Cloud Computing
Cryptographic Protocols
federated identity management systems
federated identity system scalability
multitenant authorization
Proposals
central authentication protocols
Servers
Shibboleth architecture
sticky session mechanism
Virtual machining
authentication
authorisation
CAS
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
biblio
Hash based efficient secure routing for network communication
Submitted by BrandonB on Wed, 05/06/2015 - 7:55am
mobile computing
WLAN
telecommunication security
security
Routing protocols
Routing Protocol
Routing
power backup
packet transfer
networking
network communication
Mobility
Ad hoc networks
Mobile communication
mobile ad-hoc networks
Mobile Ad-hoc
mobile ad hoc networks
infrastructure wireless networks
hash based efficient secure routing
energy problem
Cryptographic Protocols
autonomous network
authentication
attack
biblio
A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
noncolluding external servers
Servers
secure recommender system
secure multi-party computation
secret sharing
recommender systems
Protocols
protocol specification
preprocessing phase
preprocessing
adversarial model
malicious model
Cryptography
Cryptographic Protocols
computer network security
Computational modeling
collaborative filtering
client-server systems
authentication
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
biblio
Asymmetrical quantum encryption protocol based on quantum search algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
quantum cryptography
unitary operations
trapdoor one-way functions
symmetrical quantum key distribution
single photon measurement
secret messages
search quantum algorithm
search problems
quantum search algorithms
quantum search algorithm
Quantum mechanics
quantum information science
asymmetrical encryption
private-information
no-cloning theorem
key-generation randomized logarithm
information-theoretical security
Elliptic curve cryptography
Cryptography
Cryptographic Protocols
Ciphertext
Ciphers
asymmetrical quantum encryption protocol
biblio
OpenSSL HeartBleed: Security Management of Implements of Basic Protocols
Submitted by BrandonB on Tue, 05/05/2015 - 9:14am
information security management
software facilities
Software
security threats
secure socket layer
Protocols
OpenSSL security
OpenSSL HeartBleed
information technology
Computers
information security
hierarchical structure
Heart beat
hardware facilities
Hardware
Cryptographic Protocols
cross-layer security management
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
next ›
last »