Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key management
biblio
Updatable Oblivious Key Management for Storage Systems
Submitted by grigby1 on Mon, 01/27/2020 - 12:26pm
Human behavior
Human Factors
key management
Metrics
oblivious prf
oprf
pubcrawl
resilience
Resiliency
Scalability
updatable encryption
biblio
A Protection and Pay-per-Use Licensing Scheme for On-Cloud FPGA Circuit IPs
Submitted by grigby1 on Mon, 01/27/2020 - 12:26pm
cryptographic protocols and algorithms
FPGAs
hardware cloning and reverse engineering
Hardware IPs
Hardware Protection
Hardware Security
Human behavior
Human Factors
key management
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
An Improved Key Graph Based Key Management Scheme for Smart Grid AMI Systems
Submitted by grigby1 on Mon, 01/27/2020 - 12:25pm
security
Metrics
power engineering computing
Pricing
Protocols
pubcrawl
resilience
Resiliency
Scalability
scalable key management
key management scheme
Smart Grid
smart grid AMI systems
Smart Grids
smart meters
smart power grids
storage management
storage overhead
Unicast
VerSAMI key graph structure
computer network security
automatic meter reading
broadcast communication
broadcast key management performance
broadcast key management protocol
broadcast key management security
broadcast key update process
communication overhead
computer network management
computer network performance evaluation
advanced metering infrastructure
Conferences
Cryptography
graph theory
Human behavior
Human Factors
improved key graph
iVerSAMI
key graph based scheme
key management
biblio
A Machine-Checked Proof of Security for AWS Key Management Service
Submitted by grigby1 on Mon, 01/27/2020 - 12:25pm
Human behavior
Human Factors
key management
machine-checked proof
Metrics
provable-security
pubcrawl
resilience
Resiliency
Scalability
biblio
Why Joanie Can Encrypt: Easy Email Encryption with Easy Key Management
Submitted by grigby1 on Tue, 01/21/2020 - 11:54am
Applied cryptography
Compositionality
Email
encryption audits
IMAP
key management
Metrics
PGP
pubcrawl
resilience
Resiliency
S/MIME
biblio
Keys in the Clouds: Auditable Multi-Device Access to Cryptographic Credentials
Submitted by grigby1 on Tue, 11/19/2019 - 3:38pm
cloud
collaboration
Governance
Intel SGX
key management
Policy Based Governance
pubcrawl
biblio
(WIP) Authenticated Key Management Protocols for Internet of Things
Submitted by aekwall on Mon, 05/20/2019 - 9:56am
key management
telecommunication security
Smart homes
Self-certified keys
security operations
security analysis show
seamless incorporation
Resiliency
Public key
pubcrawl
Protocols
noninteractive key management protocol
Metrics
authenticated key management protocols
IoT Security 2018
IoT
Internet of Things authentication
Internet of Things
interactive key management protocol
Human behavior
heterogeneous end systems
different end systems
data privacy
Cryptographic Protocols
composability
authentication
biblio
Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure
Submitted by grigby1 on Mon, 11/19/2018 - 12:32pm
smart grid advanced metering infrastructure
power data
pubcrawl
public key cryptography
public key infrastructure
public-keys
resilience
Resiliency
Servers
Smart Grid
peer-to-peer networks
Smart Grid Sensors
Smart Grids
smart meters
smart power grids
telecommunication network management
telecommunication security
trees (mathematics)
wireless mesh networks
wireless multihop networks
Human behavior
Advanced Metering Infrastructure AMI
AMI networks
certificate revocation list
certification
Communication Network
Compositionality
distributed CRL management model
distributed hash table
distributed hash trees
advanced metering infrastructure
Human Factors
IEEE 802.11s mesh standard
key management
Logic gates
Measurement
metering
Meters
P2P networks
Peer-to-peer computing
biblio
Protecting vehicular networks privacy in the presence of a single adversarial authority
Submitted by grigby1 on Mon, 06/11/2018 - 3:39pm
Resiliency
vehicular networks privacy protection
vehicular ad hoc networks
vehicular ad hoc network
traffic-simulator based experiments
traffic engineering computing
threshold-based detection
telecommunication security
single insider adversary
single adversarial authority
Security Credential Management System
security
SCMS design
road vehicles
road traffic
central authority
resilience
relabeling
pubcrawl
privacy information leakage
privacy
principal component analysis
network accountability
Metrics
key management
data privacy
Couplings
Conferences
composability
Communication networks
biblio
Implementing a real-time capable WPLS testbed for independent performance and security analyses
Submitted by grigby1 on Thu, 06/07/2018 - 2:56pm
security
personal area networks
physical layer security
pubcrawl
real-time capable WPLS testbed
real-time systems
resilience
Resiliency
secret key rate estimation
Particle measurements
security analyses
security evaluations
telecommunication security
Wireless communication
Wireless Physical Layer Security
wireless sensor networks
WPLS research results
8-bit MCU 8051
off-the-shelf hardware
microcontrollers
Metrics
legitimate parties
key management
key extraction
Internet of Things
independent performance
IEEE 802.15.4 communication standard
generically multiple transceivers
Entropy
eavesdropper
Correlation
composability
Atmospheric measurements
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »