Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
Submitted by BrandonB on Tue, 05/05/2015 - 8:03am
password guessing attack
wireless mesh networks
wireless mesh network
synchronisation
storing key
Servers
random numbers
public key encryption
public key cryptography
Public key
Protocols
authentication
malicious software
Kerberos protocol
improved Kerberos protocol
identity authentication scheme
identity authentication
Cryptographic Protocols
clock synchronization
authorization
authentication protocol
biblio
Towards Scalability for Federated Identity Systems for Cloud-Based Environments
Submitted by BrandonB on Tue, 05/05/2015 - 7:45am
federated identity management systems
Virtual machining
sticky session mechanism
Shibboleth architecture
Servers
Scalability
Proposals
multitenant authorization
federated identity system scalability
authentication
Cryptographic Protocols
Cloud Computing
cloud based environments
central authentication service
central authentication protocols
CAS
authorisation
biblio
FlowNAC: Flow-based Network Access Control
Submitted by BrandonB on Tue, 05/05/2015 - 7:42am
authentication
authorisation
authorization
computer network security
Cryptographic Protocols
EAPoL-in-EAPoL encapsulation
flow-based network access control
FlowNAC
IEEE 802.1X
Network Access Control
Ports (Computers)
Protocols
security
Servers
software defined networking
standards
biblio
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:55pm
IEEE 802.15.4 networks
Zigbee
wireless LAN
Servers
security
Protocols
Payloads
Local area networks
IoT networks
Internet of Things
internet
802.1X
IEEE 802.15.4
IEEE 802.15 Standards
extensible authentication protocol
EAP
Cryptographic Protocols
computer network security
authorization
authorisation
authentication
access control functionality
biblio
Delegated Authenticated Authorization for Constrained Environments
Submitted by BrandonB on Mon, 05/04/2015 - 1:54pm
Internet of Things
trusted host
symmetric cryptography
smart objects
resource-constrained node
Protocols
protocol
performance evaluation
Peer-to-peer computing
authentication
Face
delegated authenticated authorization
Cryptographic Protocols
cross-domain setting
constrained environments
client authentication
authorization
biblio
On Security-Effective and Global Mobility Management for FPMIPv6 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:49pm
handover latency
security-effective mobility management
security threats
Security analysis
public key cryptography
Protocols
packet loss reduction
network node
mobility management (mobile radio)
mobile node authentication
Manganese
Kang-Park-ESS-FH scheme
Internet Engineering Task Force
IETF
AAA
Handover
global mobility management
FPMIPv6 networks
FPMIPv6
fast handover-proxy mobile IPv6
ESS-FP
enhanced security scheme
Cryptographic Protocols
CGA method
CGA
authentication-authorization-accounting infrastructure
authentication
biblio
Delegation-based authentication and authorization for the IP-based Internet of Things
Submitted by BrandonB on Mon, 05/04/2015 - 1:48pm
IP security protocols
Servers
Random access memory
public-key cryptography
public key cryptography
Protocols
peer authentication
memory-constrained devices
key agreement purposes
IP-based Internet of Things
authorization functionality
IP networks
Internet of Things
DTLS protocol
DTLS connection
delegation-based authentication
delegation server
Cryptographic Protocols
Context
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
biblio
Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:49pm
provable secure pseudonym-based cryptosystems
vehicular ad-hoc networks
vehicular ad hoc networks
vehicles
VANET
trusted authority
pseudonym-based signature scheme
pseudonym-based multi-receiver encryption scheme
pseudonym-based key establishment protocol
cooperative caching
Protocols
privacy
onion packet
encryption
data access scheme
Cryptographic Protocols
cooperative caching technology
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 12:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
« first
‹ previous
…
22
23
24
25
26
27
28
29
30
next ›
last »