Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
asymmetric case
type-3 pairing
TEPLA library
Ostrovsky-Sahai-Waters
original ABKEM
one-way-CCA security
concurrent man-in-the-middle security
challenge-and-response protocol
challenge and response
BN curve
attribute-based key-encapsulation mechanisum
attribute based
asymmetric pairing
Cryptographic Protocols
asymmetric bilinear map
ABAuth
Asymmetric Encryption
Computational efficiency
Compositionality
authentication
digital signatures
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
biblio
An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment
Submitted by grigby1 on Thu, 07/30/2020 - 1:15pm
queueing theory
MQTT broker
MQTT protocol
MQTT Thing-to-Thing Security
MQTT-TLS
MQTT-TTS
Payloads
Protocols
pubcrawl
Metrics
resilience
Resiliency
secure data exchange
telemetry
thing-to-broker channel encryption
Thing-to-Thing Security enhancement
Transport Layer Security
Human behavior
composability
computer network security
Cryptographic Protocols
data communication
data exchange protocol
electronic data interchange
encryption
end-to-end security
ciphertext-policy attribute based encryption
Human Factors
Internet of Things
Internet of things environment
IoT application developers
IoT security
massive IoT devices
Message Queue Telemetry Transport
biblio
Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
KP-ABE
threshold grouping-proofs
Security analysis
Scalability
RFID systems
radiofrequency identification
Public key
pubcrawl
policy-based governance
Pairing Cryptography
message encryption
KP-ABE protocol
Access Control
key-policy attribute-based encryption
key policy attribute based encryption
IoT applications
Internet of Things
grouping-proofs based access control
Grouping proofs
encryption
Cryptographic Protocols
collaboration
authorize NFC payment
authorisation
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 9:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Lightweight Ciphers in Automotive Networks: A Preliminary Approach
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
lightweight cryptography
safe driving experience
preliminary approach
internal network
Electronic components
controller area network protocol
automotive security
automotive networks
controller area network
CAN protocol
controller area networks
weak point
computer network security
Lightweight Ciphers
controller area network security
microcontrollers
computer networks
Cybersecurity
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units
Submitted by aekwall on Mon, 07/20/2020 - 9:42am
Intelligent Transportation Systems
Vehicular security
Plugs
low cost CAN probe
electronic control units
defined analysis tools
controller area networks
car generation
CAN bus attacks
Brakes
autonomous vehicles
automotive control area network bus
attack scenarios
connected vehicles
automobiles
automotive electronics
controller area network security
Payloads
Engines
Probes
security protocols
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Covert Communications-Based Information Reconciliation for Quantum Key Distribution Protocols
Submitted by grigby1 on Thu, 07/16/2020 - 11:19am
quantum bit-error rate
parity bits
Photonics
polarization entanglement
Protocols
pubcrawl
QBER
QKD
QKD protocol
QKD system
optical transmitters
quantum channel
quantum cryptography
quantum key distribution protocol
resilience
Resiliency
Scalability
secure key rates
unsecure key
covert channels
authenticated public channel
BB84 protocol
Bit error rate
Bragg gratings
channel loss
channel noise
composability
Compositionality
Adaptive optics
covert communication
covert communication channel
covert communications-based information reconciliation
Cryptographic Protocols
detector noise
error statistics
Jamming
noiseless public channel
biblio
Decentralized Identification and Certification System
Submitted by aekwall on Mon, 07/13/2020 - 10:19am
flexible management
web of trust
web-of-trust concept
user identificators
integrity and authenticity
individual IoT sensor
identification and certification
decentralized system
decentralized public key infrastructure
decentralized identification
decentralized environment
current public key infrastructure
certification system
certification
Servers
public key infrastructure
computer science
authenticity
blockchain technology
public key cryptography
Public key
standards
composability
pubcrawl
Resiliency
History
Cryptographic Protocols
Internet of Things
biblio
Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things
Submitted by grigby1 on Fri, 06/26/2020 - 11:55am
Internet of Things
Transportation
security protocols
Scalability
Resiliency
resilience
Public-Key Cryptosystems (PKC)
public-key cryptosystems
public key cryptography
pubcrawl
privacy and security
Metrics
Medical services
lightweight devices
IoT devices
Internet of Things (IoT)
computer architecture
indoor localization
healthcare facilities
health care
Hardware/Software Co-Design
hardware-software codesign
hardware-software co-design
Hardware
energy consumption
Elliptic-Curve Cryptography (ECC)
elliptic-curve cryptography
Elliptic curve cryptography
ECC
Cryptography
Cryptographic Protocols
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »