Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply
biblio
Key management technique for WSNs
Submitted by BrandonB on Wed, 05/06/2015 - 12:36pm
IBK
key management
security
WSN
biblio
Efficient Authentication and Key Management Mechanisms for Smart Grid Communications
Submitted by BrandonB on Wed, 05/06/2015 - 12:35pm
Protocols
Synthetic aperture sonar
smart power grids
smart meter (SM)
smart grid communications
smart grid (SG)
Servers
security
secure remote password protocol
secure remote password (SRP)
public-private key pairs
public key infrastructure
public key cryptography
Public key
authentication
mutual authentication
management overhead
key management protocol
key management
key generator entity
initial password
identity-based cryptography
home networks
home area network
Enhanced identity-based cryptography (EIBC)
Cryptographic Protocols
authorisation
authentication server
biblio
Surveing the challenges and requirements for identity in the cloud
Submitted by BrandonB on Wed, 05/06/2015 - 12:28pm
user identity federation
Access Control
authentication
business organizations
Claim
cloud
Cloud Computing
cloud service providers
cloud technologies
Computational modeling
security of data
Token
security
Computers
computing resource sharing
data centers
Federated identity
federated identity management
Federation provider
hybrid clouds
Identity provider
Organizations
SaaS
biblio
Proactive Model-Based Performance Analysis and Security Tradeoffs in a Complex System
Submitted by BrandonB on Wed, 05/06/2015 - 12:25pm
Airports
early performance evaluation
externally observable security parameters
Identity management
Inspection
Magnetic resonance
measurable security effect maximization
model-based approach
Performance - security tradeoff
Performance modeling
performance sensitivity analysis
proactive model-based performance analysis
resource allocation
security
complicated control coordination
Analytical models
Atmospheric modeling
BIMS
Biological system modeling
security of data
security tradeoff mechanisms
sensitivity analysis
traveler arrival rate
traveler identification security guarantees
border inspection management system
Border security
complex system
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 12:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
biblio
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 12:21pm
Ad hoc networks
authentication
Cryptography
identity based cryptography
informal analysis
key management
mobile ad hoc networks
Proposals
Public key
security
self-organization
self-organized key management
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Identity management and trusted interaction in internet and mobile computing
Submitted by BrandonB on Wed, 05/06/2015 - 12:18pm
business models
Computer crime
Identity management
internet
Investment
marketing data processing
mobile computing
mobile services
online markets
online services
potent access capability
security
security of data
sustainable development
Trusted Computing
trusted interaction
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 10:49am
injection-based fault simulations
Transient analysis
step-forward toward
SHA-3 algorithm
security
secure hash algorithm (SHA)-3
secure hash algorithm
rotated operand-based scheme
robust hardware implementations
Reliability
pseudorandom number generation
performance overheads
parallel processing
low-complexity recomputing
Keccak
integrity checking
acceptable complexity
high-performance concurrent error detection scheme
high performance
hashing
hardware overhead reduction
Hardware
error detection
error coverage
Cryptography
concurrency control
computational complexity
Circuit faults
ASIC analysis
Application-specific integrated circuit (ASIC)
application specific integrated circuits
Algorithm design and analysis
« first
‹ previous
…
416
417
418
419
420
421
422
423
424
…
next ›
last »