Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
LTL
verification
tools
SPIN verifier
SPIN formal verifier
SPIN
Security analysis
Resiliency
resilience
pubcrawl
Protocol Security
Promela language
policy-based governance
model checking
MITM
man in the middle attack
authentication
Linear Temporal Logic
government data processing
formal verification
Electronic voting systems
electronic voting system
electronic voting protocol
electronic voting
e-voting
E-Government
data substitution
Cybersecurity
Cryptographic Protocols
cryptographic protocol
collaboration
biblio
A Hardware-Software Codesign Approach to Identity, Trust, and Resilience for IoT/CPS at Scale
Submitted by aekwall on Mon, 09/28/2020 - 12:16pm
enhanced device identity
communication technologies
communication reliability
operational efficiency
hardware-software codesign
cyber physical systems
quality of services
Blockchain protocols
Byzantine actor
citizen welfare
distribution framework
Transmitters
entity trust
hardware-software codesign approach
IoT-CPS
multitier methodology
radio frequency-distinct native attributes
RF-DNA
RF-DNA Fingerprinting
system trustworthiness
trust-building
CPS Privacy
Wireless communication
computer network security
data privacy
Internet of Things
Cryptographic Protocols
Trusted Computing
Support vector machines
cyber-physical systems
Human behavior
pubcrawl
Communication system security
IoT
blockchain
internet
privacy
cryptocurrencies
quality of service
authentication
Human Factors
smart cities
Trust management
biblio
Cooperative Key Generation for Data Dissemination in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 12:10pm
Protocols
wireless sensor networks
wireless security
wireless fading channel
Wireless communication
wireless channels
telecommunication security
shared randomness
sensory data
secret key generation protocol
secret bit mismatch
real-time data dissemination
radio channels
quantized fading channel randomness
Quantization (signal)
pubcrawl
2-hop wireless sensor network testbed
privacy
Human Factors
Human behavior
fading channels
Experimental Evaluation
data dissemination
cyber-physical systems
cyber physical systems
Cryptographic Protocols
CPS Privacy
CPS
confidentiality
Communication system security
communication security
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Contract-Based Approach for Security Deposit in Blockchain Networks with Shards
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
Economics
Sharding
security-deposit based consensus protocol
security of data
security incentive
security deposit
Scalability
Resiliency
pubcrawl
individual rationality
incentive compatibility
hash-puzzle-solving consensus protocol
flexible deposits
beacon chain
economic incentive
Cryptographic Protocols
cryptocurrencies
contracts
contract-based approach
contract theory
consensus protocol
blockchain security
blockchain networks
blockchain
bitcoin
biblio
Effective Scheme against 51% Attack on Proof-of-Work Blockchain with History Weighted Information
Submitted by aekwall on Mon, 09/28/2020 - 11:41am
blockchain security
proof-of-work blockchain
PoW blockchains
mining
history weighted information
hash power
double-spending problems
double-spending attack
Double spending attack
blockchain systems
51% Attack
Switches
security of data
cryptocurrencies
Data mining
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
Protocols
History
Cryptographic Protocols
Scalability
biblio
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
secret challenge-response pair
identity based encryption
Intel Edison board
IoT node
IP-spoofing
key exchange protocol
Keyed hash function
password dependency
protocol resists
PUF based authentication
Digilent Nexys-4 FPGA board
secured video surveillance camera
Session Key Security
stand-alone video camera
standard network penetration tools
traditional authentication protocols
universal composability framework
verifier database
composability
physically unclonable functions
Internet of Things
Hardware
Cryptographic Protocols
Protocols
pubcrawl
Databases
authentication
message authentication
encryption
Elliptic curve cryptography
Cameras
device authentication
man-in-the-middle attack
IoT infrastructure
pufs
key management
Artix-7 FPGA
biblio
Universally Composable Key Bootstrapping and Secure Communication Protocols for the Energy Internet
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
communication
composability
universally composable key bootstrapping
universal composability model
universal composability
strong security notion
session keys
secure key bootstrapping protocol
secure communication protocol
practical key bootstrapping protocol
multiple energy resources
multicast communications
key bootstrapping
ideal functionality
energy internet
security
multicast communication
energy resources
Smart Grids
power engineering computing
Energy Efficiency
smart power grids
internet
Computational modeling
Cryptography
pubcrawl
Protocols
Cryptographic Protocols
telecommunication security
biblio
Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
internet
streaming bots attack
Streaming bots
Servers
security attacks
security attack
screenlogger
replay attack
pubcrawl
phishing attack
password-guessing attack
password
one time password
message authentication
keylogger
authentication
Intelligent captcha technique
Intelligent Authentication Scheme
Human behavior
hardware-independent Authentication Scheme
Hardware
denial of service
Cryptography
Cryptographic Protocols
computer network security
Computer crime
composability
Cloud Computing
captchas
CAPTCHA
biblio
FPGA Implementation of Internet Key Exchange Based on Chaotic Cryptosystem
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
Internet key exchange protocol
IPsec
4-dimension chaotic system
chaotic cryptosystem
chaotic cryptosystem solution
data phase transfer
FPGA implementation
IKE
IKE protocol
securing communications
keys phase exchange
man in the middle attack
network communication domain
network protocol
SA
security association attack
word length 128 bit
computer network security
IPSec protocol
chaotic cryptography
chaotic communication
Predictive Metrics
DH-HEMTs
internet
Cryptography
Synchronization
composability
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
FPGA
field programmable gate arrays
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »