Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Improvement of PRIME Protocol Based on Chaotic Cryptography
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
encryption
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
composability
Predictive Metrics
chaotic cryptography
AES algorithm
carrier transmission on power lines
Power line communications
AES encryption algorithm
Chebyshev approximation
key expansion process
narrowband power line communication protocol
PRIME protocol
biblio
An Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Submitted by grigby1 on Fri, 09/04/2020 - 3:26pm
IoT devices
BLE
security vulnerabilities
BLE 4.0
BLE 4.1
BLE 4.2
BLE protocol
elliptic-curve diffie-Hellman
firmware attacks
BLE devices
LTK
MITM attacks
Mobile Applications
pairing
vulnerabilities
Wireless communication
Cyber Physical System
bluetooth security
resilience
Cryptography
Cryptographic Protocols
mobile computing
telecommunication security
public key cryptography
pubcrawl
composability
Resiliency
Internet of Things
Human behavior
cyber physical systems
firmware
Microprogramming
performance evaluation
Bluetooth
Image color analysis
biblio
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
Submitted by grigby1 on Fri, 09/04/2020 - 3:17pm
pubcrawl
mobile crowd sensing
mobile crowd sensing (MCS)
mobile devices
obfuscatable anonymous authentication scheme
obfuscation
privacy
privacy concerns
private authentication key
mobile computing
resilience
Resiliency
sensed data
sensor fusion
sensors
smart phones
special anonymous authentication scheme
anonymous authentication
Mobile Application
Metrics
MCS
insider attacks
information collection
encryption
device capture attacks
Cryptographic Protocols
composability
black box encryption
Batch verification
authentication requests
authentication request algorithm
authentication
anonymous authentication schemes
biblio
Dynamic asymmetric group key agreement protocol with traitor traceability
Submitted by grigby1 on Fri, 09/04/2020 - 3:17pm
forward secrecy
black box encryption
setup algorithm
public traitor traceability
Public key
protocol resists collusion attack
pairwise different decryption key computation
one-round dynamic authenticated ASGKA protoco
leave algorithm
key compromise impersonation resilience
KCIR
join algorithm
IND-CPA security
Cryptographic Protocols
Eurocrypt 2009
dynamic authenticated ASGKA protocol
dynamic asymmetric group key agreement protocol
D k-HDHE assumption
common encryption key
black-box tracing algorithm
asymmetric group key agreement protocols
resilience
Resiliency
Metrics
composability
pubcrawl
biblio
TendrilStaller: Block Delay Attack in Bitcoin
Submitted by grigby1 on Fri, 09/04/2020 - 2:59pm
Distributed databases
TendrilStaller
peer-to-peer network
eclipse attack
countermeasure
blockchain state
block propagation protocol
block propagation
block delay attack
Bitcoin protocol
Bitcoin peer-to-peer network
bitcoin security
bitcoin
IP networks
Security analysis
cryptocurrencies
Human behavior
pubcrawl
Peer-to-peer computing
Cryptographic Protocols
Bandwidth
blockchain
Scalability
delays
Protocols
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
Exploring Automation in Proofs of Attribute-based Encryption in the Standard Model
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
Scalability
Cryptography
attribute-based encryption
Cryptographic Protocols
Human behavior
pubcrawl
policy-based governance
cryptographic proofs
random oracle model
proof automation
Waters ciphertext-policy attribute-based encryption scheme
biblio
Blind Certificate Authorities
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
SMTP servers
public key cryptography
public key registration
resilience
Resiliency
Scalability
SCI protocol
secure channel injection protocols
Secure-Multiparty-Computation
pubcrawl
standard email server implementations
TLS
truly anonymous systems
X.509 Certificate
zero-knowledge certificate
zero-knowledge certificate signing protocol
Zero-knowledge-Proof
Cryptographic Protocols
alice@domain.com
anonymity
anonymous messaging
anonymous proofs
authorisation
authorization
blind certificate authority
certificate binding
account ownership
data privacy
digital signatures
Electronic mail
Gmail
MPC
party encrypted communications
privacy
biblio
HSDC–Net: Secure Anonymous Messaging in Online Social Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
Scalability
messaging application providers
online social networks
practical protocol
privacy
protocol design
Protocols
pubcrawl
resilience
Resiliency
message senders
SDC-net
secure anonymous messaging
security issues
Servers
short stability issue
social networking (online)
strongest anonymity guarantees
trust ISP
DC–net
anonymous communications
anonymous messaging
Australia
blockchain users
computer network security
Cryptographic Protocols
Cryptography
data privacy
DC-net suffers
anonymization
dining cryptographers network protocol
disruption management
disruption management subprotocols
hiding contents
HSDC-net achieves low latencies
HSDC-net protocol
internet
message publishing
biblio
Anonymous Authentication and Key Agreement Protocol for LTE Networks
Submitted by grigby1 on Thu, 08/13/2020 - 4:20pm
key agreement protocol
standard TS
specific base station
signature
Scalability
Resiliency
resilience
pubcrawl
pseudorandom permutation
pseudo IMSI
Protocols
mobile terminal
message authentication
LTE networks
Long Term Evolution
3G mobile communication
internet
International Mobile Subscriber Identity
high-speed wireless communication standard
fake stations
Cryptographic Protocols
communication standard
authentication processes
authentication and key agreement protocol
authentication
authenticated scheme suitable
anonymous messaging
anonymous authentication
anonymous
3GPP
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »