Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
TTP-free asymmetric fingerprinting protocol based on client side embedding
Submitted by BrandonB on Mon, 05/04/2015 - 11:05am
image watermarking
Watermarking
TTP-free asymmetric fingerprinting protocol
trusted third party
Trusted Computing
Table lookup
Servers
secure watermark embedding
scalability issues
Protocols
personalized decryption key distribution
nonblind decoding
Multimedia systems
multimedia content distribution
asymmetric protocols
Image coding
Fingerprinting
encryption
Decoding
customer rights
Cryptographic Protocols
client-side embedding technique
client-side embedding distribution framework
Client-side embedding
client-server systems
Buyer-Seller watermarking protocol
Buyer's fingerprint
binary fingerprint
biblio
Signal fingerprinting in cognitive wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:48am
malicious attacks
wireless mesh networks
Wireless communication
wireless
telecommunication signalling
telecommunication security
spread spectrum communication
Signal to noise ratio
signal fingerprinting
security
RFF
public key cryptography
Public key
Protocols
active radiofrequency fingerprinting
Fingerprinting
DoS
denial-of-service attacks
Demodulation
Cryptographic Protocols
CRM
common-control-channel information
cognitive wireless networks
cognitive radio manager framework
cognitive radio
Cognitive
Amplitude shift keying
biblio
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Submitted by BrandonB on Fri, 05/01/2015 - 8:47am
Smart Grids
network performance
network resiliency improvement
plant-generation local area networks
Protocols
SAE
security attacks
security protocols
simultaneous authentication-of-equals
Smart Grid
smart grid mesh network security enhancement
neighborhood area networks
smart power grids
substation local area networks
Substations
trees (mathematics)
wireless LAN
wireless local area networks
wireless mesh networks
wireless sensor networks
WLAN
efficient mesh security association
Computer crime
computer network performance evaluation
computer network security
cost-ef- fective communications
Cryptographic Protocols
cyber attack
denial-of-service attack model
distributed mesh sensor networks
dynamic key distribution strategy updating
authentication
EMSA
HAN
home area networks
home networks
IEEE 802.11s
Logic gates
Merkle tree 4-way handshaking scheme
Mesh networks
NAN
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 8:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
biblio
Integrity based relationships and trustworthy communication between network participants
Submitted by BrandonB on Fri, 05/01/2015 - 8:10am
OSI layer 2
Unicast
trustworthy communication
Trusted Platform Module
Trusted Computing
trust establishment
trust
Servers
security
Protocols
protocol design
Payloads
participating node
authenticated node
operating system integrity
network participants
integrity based relationship
integrity
insider threat
industrial networks
encryption
cyber-physical systems
Cryptographic Protocols
computer network security
authentication protocol
authentication
biblio
Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid
Submitted by BrandonB on Fri, 05/01/2015 - 6:27am
privacy
vehicle-to-grid networks
Vehicle-to-grid (V2G)
smart power grids
Smart Grids
Smart Grid
Security analysis
security
secure V2G networks
ROPS
role-dependent privacy preservation scheme
Protocols
authentication
power engineering computing
interlinked subprotocols
energy supply
Energy storage
energy demand
electricity
cyber security vulnerability
Cryptographic Protocols
battery vehicles
battery powered vehicles
authentication mechanisms
biblio
Public Physical Unclonable Functions
Submitted by BrandonB on Thu, 04/30/2015 - 1:23pm
physical unclonable function (PUF)
trusted information flows
time gap
simulation possible
secret-key technology
second PPUF generation
representative PPUF architectures
public PUF (PPUF)
public PUF
public protocols
public physical unclonable functions
Public key
Protocols
process variation
private key cryptography
analog domain
one-time hardware pads
Logic gates
laborious systems
Integrated circuit modeling
integrated circuit
Hardware Security
Hardware
direct execution
digital PPUF
device aging
Cryptography
Cryptographic Protocols
crucial PUF limitation
biblio
Data security protocol for cloudlet based architecture
Submitted by BrandonB on Thu, 04/30/2015 - 1:20pm
encryption
unauthorized user
security
resource-rich computer
mobile devices
mobile computing
Mobile communication
mobile cloud computing technology
mobile cloud computing
internet
Cloud Computing
distributed cloud architecture
data security protocol
Cryptographic Protocols
Computers
computer architecture
cloudlet based architecture
cloudlet
cloud storage
biblio
Pinocchio: Nearly Practical Verifiable Computation
Submitted by Heather Lucas on Wed, 09/17/2014 - 5:34pm
base protocol
C language
correctness verification
cryptographic assumptions
Cryptographic Protocols
end-to-end toolchain
formal verification
general-purpose system
Pinocchio
program compilers
public evaluation key
public key cryptography
public verification key
verifiable computation protocol
zero-knowledge proofs
biblio
A Rewriting-based Forwards Semantics for Maude-NPA
Submitted by Jose Meseguer on Wed, 09/17/2014 - 5:30pm
Modeling
Science of Security
Simulation
Foundations
ACM CCS
Applied cryptography
cryptographic protocol analysis
Cryptographic Protocols
Cryptography
foundations
logical narrowing-based reachability analysis
model checking
modeling
protocol verification
reasoning modulo an equational theory
Science of Security
simulation
standard rewriting-based model checking
term rewriting
ACM CCS
Cryptography
Applied Cryptography
Cryptographic Protocols
« first
‹ previous
…
22
23
24
25
26
27
28
29
30