Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
provable security
biblio
High-Assurance Cryptography in the Spectre Era
Submitted by aekwall on Fri, 02/25/2022 - 9:45am
Software
Robustness
privacy
Libraries
pubcrawl
Resiliency
Semantics
Compositionality
Predictive Metrics
Program processors
Memory management
provable security
biblio
An Effective Technology for Secured Data Auditing for Cloud Computing using Fuzzy Biometric Method
Submitted by aekwall on Fri, 02/25/2022 - 9:45am
Control Theory
resilience
biometrics (access control)
Cloud Computing
Compositionality
data integrity
Hardware
passwords
Predictive Metrics
provable security
pubcrawl
Resiliency
security
Servers
biblio
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
Submitted by aekwall on Fri, 02/25/2022 - 9:44am
privacy
performance evaluation
authentication
Protocols
pubcrawl
Resiliency
Internet of Things
Industries
Compositionality
Predictive Metrics
provable security
Elliptic curves
Computers
Bilinear Pairing
identity authentication
Key exchange
biblio
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Submitted by aekwall on Fri, 02/25/2022 - 9:44am
privacy
Protocols
pubcrawl
Resiliency
standards
Compositionality
digital signatures
Predictive Metrics
NIST
provable security
Digital-signature-scheme
DSKS-attack
exclusive-ownership
message-bound-signatures
NIST-PQC-candidates
non-re-signability
biblio
On Preventing SAT Attack with Decoy Key-Inputs
Submitted by aekwall on Fri, 02/25/2022 - 9:44am
logic locking
Very large scale integration
Switches
supply chains
SAT attack
Resistance
Resiliency
pubcrawl
provable security
Predictive Metrics
overproduction
Tamper resistance
ip protection
intellectual property
Hardware Security
design-for-trust
control systems
computer architecture
Compositionality
Human Factors
Metrics
Scalability
biblio
Blockchain-Based Distributed Data Integrity Auditing Scheme
Submitted by aekwall on Fri, 02/25/2022 - 9:43am
blockchain
fair arbitration
decentralization
provable security
public auditing
data integrity
Predictive Metrics
component
Compositionality
security
Resiliency
pubcrawl
Conferences
smart contracts
Cloud Computing
Resists
Big Data
biblio
Perfect Secrecy in the Bounded Storage Model
Submitted by aekwall on Fri, 02/25/2022 - 9:43am
Cryptography
Protocols
Conferences
pubcrawl
Resiliency
Global communication
Compositionality
faces
Predictive Metrics
Secure storage
Additives
Bounded storage model
group theory
information-theoretic security
provable security
biblio
A Secure Channel Established by the PF-CL-AKA Protocol with Two-Way ID-based Authentication in Advance for the 5G-based Wireless Mobile Network
Submitted by aekwall on Fri, 02/25/2022 - 9:43am
Compositionality
provable security
two-way identity-based authentication in advance
provable secure in Lippold model
pairing-free certificateless authenticated key agreement (PF-CL-AKA) protocol
fully secure channel
5G-based wireless mobile network
Predictive Metrics
Communication system security
quality of service
Resiliency
pubcrawl
Wireless communication
Analytical models
Protocols
authentication
data communication
biblio
Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain
Submitted by aekwall on Fri, 02/25/2022 - 9:42am
blockchain
blockchains
Compositionality
Elliptic curves
Generators
Online banking
Predictive Metrics
Protocols
provable security
pubcrawl
Public key
Resiliency
Steganography
biblio
The Provable Security of Ed25519: Theory and Practice
Submitted by aekwall on Fri, 02/25/2022 - 9:42am
security
privacy
Protocols
resilience
pubcrawl
Resiliency
encoding
standards
Compositionality
Predictive Metrics
Clamps
provable security
1
2
3
4
5
6
7
next ›
last »