Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security analysis
biblio
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
NIST randomness test
telecommunication security
symmetric-key cryptographic operations
Security analysis
RFID tags
randomness test
random number generation
radiofrequency identification
pubcrawl170112
polynomials
NIST SP800-22
cryptanalysis
NIST
low-cost RFID tags
lightweight pseudorandom number generators
lightweight PRNG
LFSR-based PRNG security
international RFID standards
Generators
EPC Gen2 tags
EPC Gen2 RFID tag
Cryptography
biblio
Cryptanalysis and improvement of two RFID-OT protocols based on quadratic residues
Submitted by grigby1 on Wed, 03/08/2017 - 1:29pm
quadratic residue
supply chains
Supply Chain
Servers
Security analysis
security
secure RFID tag ownership transfer protocol
RFID-OT protocol improvement
RFID
radiofrequency identification
radio frequency identification
Quadratic Residues
cryptanalysis
pubcrawl170112
Protocols
protocol
probability
privacy
Ownership Transfer
Information systems
desynchronization attack
Cryptography
Cryptographic Protocols
biblio
A variant of schnorr signature scheme for path-checking in RFID-based supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
pubcrawl170112
telecommunication security
supply chains
supply chain management
Supply Chain
Security analysis
Schnorr signature
RFID-based supply chains
RFID technology
RFID
radiofrequency identification
authentication
Protocols
privacy analysis
privacy
path-checking protocols
path-checking
modified schnorr signature scheme
Generators
data privacy
check reader
biblio
On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
Submitted by grigby1 on Wed, 03/08/2017 - 1:25pm
protocol-based clustering tag
telecommunication security
supply-chain management systems
supply chain management
Servers
Security analysis
security
RFID systems
RFID
radiofrequency identification
radio frequency identification
pubcrawl170112
Protocols
authentication
privacy
mathematical analysis
Intelligent systems
industrial environment
Indexes
healthcare monitoring and
delays
delay analysis
cryptography protocol
Cryptographic Protocols
cryptographic protocol
file
A String, Regular Expression, and Integer Solver for Bug-finding and Security
Submitted by Anonymous on Tue, 01/26/2016 - 2:52pm. Contributors:
Yunhui Zheng
Vijay Ganesh
Sanu Subramanian
Omer Tripp
Julian Dolby
Xiangyu Zhang
Presented as part of the
2016 HCSS conference
.
Validation and Verification
Security analysis
SMT
String constraint solver
High Confidence Software and Systems Conference 2016
Academia
Presentation
HCSS 2016
biblio
A Semantic Analysis of Key Management Protocols for Wireless Sensor Networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:53pm
key management protocol
Process calculus
Security analysis
Wireless Sensor Network
biblio
On the security of a certificateless signcryption scheme
Submitted by BrandonB on Wed, 05/06/2015 - 10:02am
encryption
Security analysis
Receivers
public key encryption
public key cryptography
Public key
key replacement attack
IND-CCA2 security
group theory
Games
certificateless signcryption scheme
discrete logarithm problem
Digital Signcryption
digital signatures
digital signature
Diffie-Hellman problem
Cryptography
cryptographic primitive
concrete attack approach
Computers
biblio
Scalable Security Models for Assessing Effectiveness of Moving Target Defenses
Submitted by BrandonB on Tue, 05/05/2015 - 10:16am
internet
security of data
Security Modeling Techniques
security assessment
Security analysis
security
scalable security models
networked system security
MTD
moving target defenses
moving target defense
Measurement
Linux
Analytical models
IMs
importance measures
hierarchical attack representation models
HARMs
graph theory
exhaustive search method
effectiveness assessment
Diversity methods
Computational modeling
Attack Representation Model
attack graphs
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 9:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme
biblio
On Security-Effective and Global Mobility Management for FPMIPv6 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:49pm
handover latency
security-effective mobility management
security threats
Security analysis
public key cryptography
Protocols
packet loss reduction
network node
mobility management (mobile radio)
mobile node authentication
Manganese
Kang-Park-ESS-FH scheme
Internet Engineering Task Force
IETF
AAA
Handover
global mobility management
FPMIPv6 networks
FPMIPv6
fast handover-proxy mobile IPv6
ESS-FP
enhanced security scheme
Cryptographic Protocols
CGA method
CGA
authentication-authorization-accounting infrastructure
authentication
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »