Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key management
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 11:23am
heterogeneous networked society
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
3D PAKE protocol
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
security threats
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
computer network security
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
biblio
Analyzing the Attack Landscape of Zigbee-Enabled IoT Systems and Reinstating Users' Privacy
Submitted by willirn1 on Fri, 10/23/2020 - 11:45am
attacks
ECDH
formal analysis
IoT
key management
NCSU
Policy-Governed Secure Collaboration
Principles of Secure BootStrapping for IoT
privacy
Zigbee
Policy-Governed Secure Collaboration
NCSU
Principles of Secure BootStrapping for IoT
2020: July
biblio
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
secret challenge-response pair
identity based encryption
Intel Edison board
IoT node
IP-spoofing
key exchange protocol
Keyed hash function
password dependency
protocol resists
PUF based authentication
Digilent Nexys-4 FPGA board
secured video surveillance camera
Session Key Security
stand-alone video camera
standard network penetration tools
traditional authentication protocols
universal composability framework
verifier database
composability
physically unclonable functions
Internet of Things
Hardware
Cryptographic Protocols
Protocols
pubcrawl
Databases
authentication
message authentication
encryption
Elliptic curve cryptography
Cameras
device authentication
man-in-the-middle attack
IoT infrastructure
pufs
key management
Artix-7 FPGA
biblio
Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
PSO algorithms
Nature Inspired
metaheuristic algorithms
key organization
key allocation
homomorphic encryption approach
homomorphic encoding scheme
homomorphic algorithm
Homomorphic
encoding technique
encoding procedure
cloud data
resource utilization
homomorphic encryption scheme
Cloud Computing
encoding
Human Factors
cloud server
key management
particle swarm optimization
particle swarm optimisation
Metrics
resource management
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
Cross-Domain Secure Sharing of Video Based on White-Box Encryption
Submitted by grigby1 on Fri, 04/17/2020 - 10:57am
composability
Compositionality
encrypted video
key management
Metrics
pubcrawl
resilience
Resiliency
secure sharing
security grading
White Box Security
white-box cryptography theory
biblio
Robust Channel Parameters for Crypto Key Generation in Underwater Acoustic Systems
Submitted by aekwall on Mon, 03/02/2020 - 12:35pm
quantisation (signal)
Underwater Networks
underwater acoustic systems
Underwater acoustic communications
underwater acoustic communication
telecommunication security
signal processing
Scalability
robust channel parameters
Resiliency
Ad hoc networks
pubcrawl
Physical layer security (PLS)
physical layer security
Metrics
key management
Cryptography
crypto-key generation algorithm
channel impulse response
ad hoc underwater acoustic networks
biblio
A Hypergraph-Based Key Management Scheme for Smart Charging Networking
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
key management scheme SCHKM
two-subnetwork model
telecommunication network management
smart charging network
Smart Charging
security requirements
security of data
SCHKM scheme
Scalability
Resiliency
resilience
pubcrawl
Metrics
Key storage
Cryptography
key management
key generation cost
hypergraph-based key management scheme
hypergraph theory
hypergraph structure
Human Factors
Human behavior
graph theory
electric vehicle users
electric vehicle charging
data security requirements
Data Security
biblio
A High-Speed Key Management Method for Quantum Key Distribution Network
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
quantum key distribution network
one-time pad tunnel manager
Photonics
private key cryptography
pubcrawl
public key cryptography
QKD key generation
QKD network
quantum cryptography
Quantum Key Distribution
one-time pad
Receivers
resilience
Resiliency
Scalability
secure communication
transparent encryption link
unconditional secure communication
Web API
high-speed key management method
application communication
application key consumption
application program interfaces
data communication
eavesdropping
encryption
encryption key sharing
global key manager
adjacent nodes
high-speed method
high-speed QKD system
Human behavior
Human Factors
key management
local key manager
Metrics
network systems
biblio
Enhanced Blockchain Based Key Management Scheme against Key Exposure Attack
Submitted by grigby1 on Mon, 01/27/2020 - 12:26pm
blockchain
Human behavior
Human Factors
Internet of Things
key exposure attack
key management
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
An Efficient Date-Constraint Hierarchical Key Management Scheme with Fast Key Validation Checking for Mobile Agents in E-Medicine System
Submitted by grigby1 on Mon, 01/27/2020 - 12:26pm
Access Control
Date-constraint
E-medicine system
Elliptic Curve Cryptosystem
Human behavior
Human Factors
key management
Metrics
mobile agent
pubcrawl
resilience
Resiliency
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »