Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
threshold cryptography
biblio
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Submitted by grigby1 on Thu, 10/29/2020 - 11:57am
Public key
wireless technology
trust value
time analysis
threshold cryptography
telecommunication security
space analysis
Servers
robust cryptography scheme
Resiliency
resilience
Receivers
public string based threshold cryptography
public key cryptography
ad hoc network
pubcrawl
PSTC
mobile ad hoc networks
mobile ad hoc network
Metrics
message privacy
manet privacy
MANET
denial-of-service attack
denial of service
default threshold value
data privacy
Compositionality
biblio
FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table
Submitted by aekwall on Mon, 12/16/2019 - 1:46pm
Indexes
threshold cryptography
system reliability
Servers
secret sharing
resilience
pubcrawl
privacy protection
privacy
Mathematical model
life cycle
internet
Instant messaging
data deletion
Human behavior
hash collision
frequent colliding hash table
FlashGhost
data self destructing
Data Sanitization
data privacy
Cryptography
computer network security
computer network reliability
Compositionality
automatic data sanitization system
biblio
DiSE: Distributed Symmetric-Key Encryption
Submitted by grigby1 on Tue, 10/08/2019 - 4:45pm
authenticated encryption
distributed pseudo-random functions
Human behavior
Metrics
pubcrawl
random key generation
resilience
Resiliency
Scalability
secret management systems
threshold cryptography
biblio
A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Protocols
threshold cryptography
threshold
telecommunication security
Servers
security protocols
security of data
securities issues
RSA cryptography
RSA
Resiliency
public key cryptography
pubcrawl
authentication
protocol models
protocol
Metrics
Kerberos authentication protocol
Kerberos
Human behavior
high security
Elliptic curve cryptography
ECC
Cryptographic Protocols
Cloud Security
Cloud Computing
biblio
Proactive secret sharing for long lived MANETs using Elliptic Curve Cryptography
Submitted by grigby1 on Wed, 06/20/2018 - 12:22pm
Ad hoc networks
bi-variate polynomial
Compositionality
Elliptic curve cryptography
MANET
Metrics
mobile ad-hoc network
mobile computing
proactive
Protocols
pubcrawl
resilience
Resiliency
secret sharing technique
security
threshold cryptography