Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key management
biblio
A Decentralized Hierarchical Key Management Scheme for Grid-Organized Wireless Sensor Networks (DHKM)
Submitted by aekwall on Tue, 08/17/2021 - 4:16pm
Metrics
WSN
wireless sensor networks
Topology
Scalability
Routing
Resiliency
pubcrawl
Protocols
Base stations
key management
Intra Communication
Inter communication
Human behavior
group key
grid
Cryptography
biblio
Achieving one-time pad via endogenous secret keys in wireless communication
Submitted by aekwall on Tue, 08/17/2021 - 4:16pm
key management
the one-time pad
Signal to noise ratio
secret key generation
resource management
physical layer security
Endogenous security
eavesdropping
Binary phase shift keying
security
Communication system security
Human behavior
Resiliency
Metrics
pubcrawl
Wireless communication
Scalability
biblio
A Network Time Security Based Automatic Key Management for PTPv2.1
Submitted by aekwall on Tue, 08/17/2021 - 4:15pm
authentication
Clocks
Human behavior
IEEE 1588
key management
Manuals
Metrics
Monitoring
NTS
Proposals
Protocols
PTPv2.1
pubcrawl
Resiliency
Scalability
security
biblio
Secure and Transparent Public-key Management System for Vehicular Social Networks
Submitted by aekwall on Tue, 08/17/2021 - 4:15pm
security
blockchain
privacy
authentication
Scalability
social networking (online)
Public key
pubcrawl
Metrics
Resiliency
Human behavior
Proposals
key management
transparency
Vehicular Public-key Infrastructure (V-PKI)
Vehicular Social Networks (VSNs)
biblio
A Framework for Key Management Architecture for DTN (KMAD): Requirements and Design
Submitted by aekwall on Tue, 08/17/2021 - 4:15pm
key establishment
styling
style
Scalability
Resiliency
pubcrawl
Protocols
Metrics
Key Management Architecture
key management
authentication
insert (key words) DTN
Human behavior
Heuristic algorithms
framework
formatting
computer architecture
component
Ciphers
biblio
Security Analysis and Improvement of Identity-based Key Management Scheme for Airborne Ad Hoc Networks
Submitted by aekwall on Tue, 08/17/2021 - 4:15pm
security
Resists
authentication
Scalability
pubcrawl
Metrics
Resiliency
Human behavior
Ad hoc networks
Airborne ad hoc networks
Forgery
forgery attack
identity-based
key management
Optics
Telecommunications
biblio
Private Identity-Based Encryption For Key Management
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
Cancer
computer science
encryption
Human behavior
Identity management
Identity-based encryption
key management
Lung
Private Identity
Protocols
pubcrawl
resilience
Resiliency
Scalability
biblio
Group Key Management in Cloud for Shared Media Sanitization
Submitted by grigby1 on Tue, 02/16/2021 - 1:24pm
Data Sanitization
security
resilience
Remote Key Management Services
pubcrawl
privacy
Media
Key Management Services
Handheld computers
grid computing
encryption
key management
Crypto Shredding
Compositionality
Cloud Security
cloud computing security
Cloud Computing
Client-side Key Management Services
Human behavior
Metrics
Resiliency
Scalability
biblio
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature
Submitted by aekwall on Mon, 01/18/2021 - 11:25am
Cryptography
user authentication
Servers
security
secret key management technology
secret key management issues
Secret key management
public key cryptography
pubcrawl
key management devices
Fuzzy signature
fuzzy set theory
Fuzzy Cryptography
digital signatures
decentralized payments
key management
blockchain technology
blockchain system
biometrics-based digital signature scheme
biometrics fuzzy signature
Biometrics authentification
biometrics (access control)
biometric information
authorisation
authentication
Human behavior
Metrics
Resiliency
Scalability
biblio
Secure Data Streaming to Untrusted Road Side Units in Intelligent Transportation System
Submitted by aekwall on Mon, 11/23/2020 - 11:28am
Data Analytics
Intelligent Data and Security
Intelligent Data Security
vehicles stream data
vehicle-to-infrastructure communications
vehicle layer
untrusted road side units
secure data streaming
road side unit
data security issues
sensory data
key management
Intelligent Transportation Systems
Intelligent Transportation System
Compositionality
IoT
multi-tenancy
data analysis
vehicular ad hoc networks
privacy
pubcrawl
Resiliency
telecommunication security
Access Control
encryption
Data Security
Cryptography
Scalability
Monitoring
automobiles
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »