Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key management
biblio
A Secure and Receiver-Unrestricted Group Key Management Scheme for Mobile Ad-hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 6:29pm
composability
Wireless communication
security
secure group communication
resilience
Receivers
Protocols
performance evaluation
Optimized production technology
mobile ad-hoc networks
key management
authentication
Ad hoc networks
Ad Hoc Network Security
Access Control
Human behavior
Metrics
Resiliency
Scalability
pubcrawl
biblio
An Efficient Distributed Secured Broadcast Stateless Group Key Management Scheme for Mobile Ad Hoc Networks
Submitted by grigby1 on Fri, 12/09/2022 - 6:29pm
Hash functions
simulation
security
resilience
pubcrawl
Performance analysis
mobile computing
mobile ad hoc networks
interpolation
Informatics
key management
Group key management
composability
Broadcast stateless
Ad Hoc Network Security
Human behavior
Metrics
Resiliency
Scalability
pub-crawl
biblio
An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
Fuzzy Cryptography
authentication
Cloud Computing
Costs
Fog computing
key management
Mobile handsets
ProVerif
pubcrawl
resilience
Resiliency
Resists
Scalability
security
security issues
Servers
biblio
Autonomous Application in Requirements Analysis of Information System Development for Producing a Design Model
Submitted by grigby1 on Fri, 08/12/2022 - 2:25pm
Complexity theory
Swarm Intelligence
dynamic
telecommunication computing
key management
convolution neural network
Computing Theory
trust
Technological innovation
Trusted Computing
Organizations
network security
programming
composability
Safety
Resiliency
resilience
Human behavior
pubcrawl
biblio
Dynamic Key Management Scheme for Clustered Sensor Networks with Node Addition Support
Submitted by grigby1 on Tue, 04/19/2022 - 10:40am
Public key
wireless sensor networks
wireless network
Wireless communication
sensor security
security
Scalability
Routing protocols
resilience
authentication
pubcrawl
Logic gates
key management
confidentiality
Communication system security
Clustered Sensor Network
batteries
biblio
Secure Key Management Scheme With Good Resiliency For Hierarchical Network Using Combinatorial Theory
Submitted by aekwall on Fri, 02/04/2022 - 10:36am
wireless sensor networks
Base stations
Wireless communication
pubcrawl
Routing protocols
Resistance
Buildings
key management
Reliability engineering
Resiliency
BIBD
combinatorial design
Key Distribution
key refreshment
biblio
Research of Ubiquitous Power Internet of Things Security Authentication Method Based on CPK and RIFD
Submitted by grigby1 on Thu, 09/16/2021 - 2:11pm
CPK
Human behavior
key management
pubcrawl
radio frequency identification
Radio frequency identification (RFID)
resilience
Resiliency
RFID
RFIDs
security authentication
ubiquitous power IoT
biblio
LOKI: A Lightweight Cryptographic Key Distribution Protocol for Controller Area Networks
Submitted by aekwall on Tue, 09/07/2021 - 11:13am
Cryptography
sensors
Hardware
Software
Servers
authentication
Protocols
pubcrawl
Resiliency
Internet of Things
key management
controller area networks.
security protocols
controller area network security
cyber-physical systems
biblio
Key Rate Enhancement by Using the Interval Approach in Symmetric Key Extraction Mechanism
Submitted by aekwall on Tue, 08/17/2021 - 4:17pm
Floors
wireless security
wireless networks
symmetric key extraction mechanism
Quantization (signal)
key rate
key bit difference
interval approach
indoor environment
Scalability
key management
Communication system security
Ad hoc networks
testing
Human behavior
Resiliency
Metrics
pubcrawl
biblio
Secret Key Attaches in MIMO IoT Communications by Using Self-injection Artificial Noise
Submitted by aekwall on Tue, 08/17/2021 - 4:16pm
delays
Scalability
pubcrawl
Metrics
Resiliency
Human behavior
Physical layer
IoT security
key management
Binary phase shift keying
Signal to noise ratio
MIMO communication
physical layer security
receiving antennas
secret key generation
Secret key sharing
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »