Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
IKE protocol
word length 128 bit
Synchronization
security association attack
securing communications
SA
Protocols
network protocol
network communication domain
man in the middle attack
keys phase exchange
IPSec protocol
IPsec
Internet key exchange protocol
internet
chaotic cryptography
IKE
FPGA implementation
FPGA
field programmable gate arrays
DH-HEMTs
data phase transfer
Cryptography
Cryptographic Protocols
computer network security
chaotic cryptosystem solution
chaotic cryptosystem
chaotic communication
4-dimension chaotic system
pubcrawl
biblio
Improvement of PRIME Protocol Based on Chaotic Cryptography
Submitted by grigby1 on Fri, 01/22/2021 - 1:51pm
AES algorithm
AES encryption algorithm
carrier transmission on power lines
chaotic cryptography
Chebyshev approximation
Cryptographic Protocols
encryption
key expansion process
narrowband power line communication protocol
Power line communications
PRIME protocol
Protocols
pubcrawl
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 4:21pm
integrated circuit
Tamarin prover
security protocols
Security Properties
Resiliency
resilience
pufs
PUF-based protocols
PUF API
pubcrawl
Protocols
physical unclonable functions
mutual authentication protocol
integrated circuits
Analytical models
hardware-based security
Hardware
formal methods and verification
fingerprint identification
error correction data
Data models
Cryptography
Cryptographic Protocols
Compositionality
application programming interface
APIs
API
biblio
Lightweight Crypto-Assisted Distributed Differential Privacy for Privacy-Preserving Distributed Learning
Submitted by aekwall on Mon, 01/11/2021 - 1:40pm
mean square error methods
unbiased encoding
trusted server
three-layer encryption protocol
private training data
privacy-preserving distributed learning
privacy guarantees
lightweight crypto-assisted distributed differential privacy
floating-point values
distributed learning
distributed differential privacy
centralized differential privacy
privacy-utility tradeoff
Privacy-preserving
mean squared error
Scalability
differential privacy
privacy
composability
pubcrawl
Human behavior
Resiliency
privacy leakage
learning (artificial intelligence)
Data models
Cryptographic Protocols
distributed processing
data privacy
encryption
Servers
biblio
Head(er)Hunter: Fast Intrusion Detection using Packet Metadata Signatures
Submitted by aekwall on Mon, 01/11/2021 - 1:35pm
fast intrusion detection
Internet traffic
prevention systems
deep packet inspection
current network encryption trends
DPI implementations
DPI tools
encrypted network traffic
encryption protocols
Payloads
fast signature-based intrusion detection system
network packet metadata
network speeds
network traffic inspection
packet contents
packet headers
packet metadata signatures
packet payload content
internet
Scalability
telecommunication traffic
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
Cryptography
malicious activities
computer network security
Internet users
metadata
pattern matching
Intrusion Detection
digital signatures
packet forwarding
Engines
biblio
Remote Access Control Model for MQTT Protocol
Submitted by aekwall on Mon, 01/11/2021 - 1:32pm
access control model
data deletion
TLS protocol
third-party services
remote access control model
OAuth protocol
Internet of Things security problems
device discretionary access control model
data transferring
access privileges
access matrix
security
secure access control
MQTT protocol
MQTT
privacy
pubcrawl
Cryptographic Protocols
Internet of Things
authorisation
Scalability
computer network security
biblio
BLESS: A BLE Application Security Scanning Framework
Submitted by grigby1 on Mon, 12/28/2020 - 12:29pm
BLE Security Scan framework
IoT security
secure communication
Biomedical monitoring
bluetooth security
1073 BLE apps
BLE application Security scanning framework
BLE attacks
BLE based devices
Application Layer
BLE Security Scanning
BLE-based device
BLESS
Blood pressure
pairing strategies
physical security
reverse engineering
widely adopted wireless communication technology
telecommunication security
encryption
Internet of Things
security of data
Bluetooth
pubcrawl
Human behavior
resilience
Resiliency
Cryptography
IoT device
Cryptographic Protocols
authentication
Protocols
public key cryptography
composability
bluetooth low energy
biblio
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain
Submitted by aekwall on Mon, 12/21/2020 - 1:36pm
Data Transmission
trusted hardware
physically unclonable function
data analysis methods
blockchain ledger
authenticated encryption method
AI technology
data trustworthiness
Trusted Execution Environment
artificial intelligence technology
TEE
IoT device
digital signatures
Artificial Intelligence
smart cities
IoT
Relays
trustworthiness
secure protocol
data analysis
blockchain
composability
pubcrawl
Trusted Computing
Protocols
Cryptographic Protocols
Internet of Things
encryption
Servers
computer network security
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 1:35pm
IP networks
trustworthiness
Trusted Computing
third-party DNS service
Third-Party DNS
T2DNS
service proxy
Servers
server attackers
pubcrawl
Protocols
privacy preservation
privacy
obfuscation protocol
attestation
Internet infrastructure
internet
Intel SGX
initialization process
hybrid protocol
encryption protocol
encryption
data privacy
Cryptographic Protocols
computer network security
composability
client DNS queries
channel attackers
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 1:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »