Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptographic Protocols
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
mutual authentication
Servers
Scalability
resource-rich server authentication
Resistance
Resiliency
resilience
replay attacks
Registers
PUF-based authentication method
pubcrawl
Protocols
Policy-Governed Secure Collaboration
policy-based governance
physical unclonable function-based authentication protocol
physical unclonable function (PUF)
active deception protocol
Multiplexing
ML attack
machine learning attacks
learning (artificial intelligence)
Generators
false trust
false PUF multiplexing
Cryptographic Protocols
challenge response pairs
Buildings
binary channel
authentication protocol
authentication
authentic CRP
attack resistant deception technique
biblio
Optimization of a Quantum-Secure Sponge-Based Hash Message Authentication Protocol
Submitted by grigby1 on Fri, 06/12/2020 - 11:10am
Protocols
Xilinx High-Level Synthesis
sponge-based SHA-3 hashing algorithm
sponge functions
SHA-2
SHA-1
Resiliency
resilience
quantum-secure sponge-based hash message authentication protocol
quantum cryptography
quantum computing standpoint
quantum computing
pubcrawl
Compositionality
post-quantum-secure SHA-3 hash message authentication
pipelined version
optimized version
optimization
networking security protocols
message authentication
hashing standard
Hash functions
hash algorithms
Hardware
fundamental building block
Cryptographic Protocols
biblio
Multi-Mediated Semi-Quantum Key Distribution
Submitted by grigby1 on Tue, 06/02/2020 - 10:55am
Protocols
telecommunication security
standards
shared secret key
Servers
semiquantum users
semiquantum key distribution protocol
security
Scalability
Resiliency
resilience
quantum noise
quantum cryptography
public key cryptography
pubcrawl
adversarial quantum server
private key cryptography
policy-based governance
multimediated SQKD protocol
multimediated semiquantum key distribution
Metrics
information theoretic security analysis
information theoretic security
Human Factors
Human behavior
Gain measurement
fully-quantum
Cryptographic Protocols
Companies
arbitrary MM-SQKD protocols
biblio
Composable, Unconditionally Secure Message Authentication without any Secret Key
Submitted by grigby1 on Tue, 06/02/2020 - 10:55am
message authentication
secure message authentication
Scalability
Resiliency
resilience
pubcrawl
Protocols
probability
policy-based governance
Noise measurement
Metrics
authentication
information theoretic security
Human Factors
Human behavior
error correction codes
error correction
encoding
Decoding
Cryptography
Cryptographic Protocols
channel coding
biblio
Cryptanalysis and improvement of a cloud based login and authentication protocol
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
online banking system
impersonation attack
internet
medium scale banking organization
Metrics
Mobile banking
mobile computing
multifactor authentication
Online banking
Human Factors
pubcrawl
public cloud
resilience
Resiliency
security
Servers
small scale banking organization
authentication
Human behavior
high-speed online services
Fingerprint recognition
electronic banking
e-banking services
e-banking
Cryptographic Protocols
cryptanalysis
cloud server
Cloud Computing
cloud based login
Business
bank data processing
authorisation
authentication protocol
biblio
An Extensive Formal Analysis of Multi-factor Authentication Protocols
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Protocols
Metrics
multifactor authentication
multifactor authentication protocols
P ROVERIF tool
password
Phishing
pi calculus
protocol analysis attackers
message authentication
pubcrawl
resilience
Resiliency
Servers
threat model
threat scenarios
users authentication
authentication
malwares
invasive software
Human Factors
Human behavior
Google 2-step
Google
FIDO U2F
extensive formal analysis
data privacy
Cryptographic Protocols
Computer crime
Communication Network
automated protocol analysis
authorisation
authentication mechanisms
biblio
Secret Sharing Schemes with Hidden Sets
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Metrics
uniform distribution
telecommunication security
Shamirs secret sharing scheme
set theory
Resiliency
resilience
pubcrawl
Protocols
polynomials
polynomial
multifactor authentication
Analytical models
malicious dealer
interpolation
Human Factors
Human behavior
detect hidden sets
Cryptography
Cryptographic Protocols
cryptographic keys
Computers
Computational modeling
cloud providers
biblio
RAD: Reinforcement Authentication DYMO Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
demand protocol
Secret key
Compositionality
Encryption technique
mobility management (mobile radio)
malicious node
MANET security
authentication technique
average throughput
cryptographic operations
mobile ad hoc network
DYMO
dynamic MANET
infrastructure centralized server
MD5
Message Digest 5
RAD
reinforcement authentication DYMO protocol
Reinforcement.
Routing protocols
telecommunication security
Cryptographic Protocols
learning (artificial intelligence)
Resiliency
pubcrawl
Routing
Metrics
Reinforcement learning
authentication
encryption
message authentication
packet delivery ratio
telecommunication computing
delays
MANET
mobile ad hoc networks
Throughput
end to end delay
biblio
Protecting Messages Using Selective Encryption Based ESI Scheme for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
Selective Encryption
wired networks
reasons MANET
protecting messages
misbehaving node
ESI scheme
encryption scheme
dynamic topology
centralized administrator
ample protection
MANET security
mobile nodes
message passing
telecommunication security
security scheme
Compositionality
mobile ad hoc network
telecommunication network topology
mobile ad hoc networks
MANET
Metrics
Routing protocols
pubcrawl
Resiliency
Cryptographic Protocols
biblio
Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification
Submitted by aekwall on Mon, 05/11/2020 - 10:13am
authentication
unique features
proactive intrusion prevention
prevention system
power supply
multiple techniques
minimum bandwidth
limited energy
HLPSL.
AVISPA tool
AVISPA
industrial environments
WSN
intrusion prevention
formal verification
military applications
Intrusion Detection
tools
network intrusion detection
Metrics
wireless sensor networks
Wireless Sensor Network
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Protocols
Cryptographic Protocols
Servers
computer network security
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »