Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key management
biblio
An Efficient NSKDP Authentication Method to Secure Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 4:09pm
privacy
Vulnerability
symmetric key distribution method
smart power grids
smart meters
Smart Grids
smart grid power
smart grid consumer privacy
Smart Grid
smart electric meters
Servers
secure smart grid
pubcrawl
private key cryptography
Communication networks
power system security
NSKDP authentication method
Meters
key management
Human Factors
Hash functions
encryption
cyber security
cryptography strategies
Cryptographic Protocols
countermeasures attacks
consumer energy supply
biblio
Implementation of SERPENT cryptographic algorithm for secured data transmission
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
key management
Technological innovation
symmetric key
substitution permutation network
SERPENT cryptographic algorithm
SERPENT
secured data transmission
s-box stage
round function
Resiliency
resilience
Repudiation
pubcrawl
Metrics
linear mixing stage
key scheduling
Algorithm design and analysis
IP networks
human factor
Human behavior
graphical programming tool
encryption
enciphering process
decryption
deciphering process
Data Security
data integrity
Cryptography
composability
Ciphers
Blockcipher
biblio
Secure key management for 5G physical layer security
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
Scalability
next generation 5G wireless networks
parity check codes
passive eavesdropper
Physical layer
physical layer security
pubcrawl
resilience
Resiliency
network security
secure key management
Signal to noise ratio
telecommunication security
unsecured wireless medium
very high error probability
Wireless communication
wiretap channel
LDPC codes
Communication system security
Correlation
diversity order
eavesdropping channels
error statistics
Human behavior
key management
LDPC
5G mobile communication
legitimate communication parties
legitimate receiver
legitimate transmitter
legitimate users
low density parity check codes
Metrics
mobility management (mobile radio)
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Security in a Distributed Key Management Approach
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
key management
user-specific keys
single-tenant scenario
Servers
sensitive data
Scalability
Runtime
Resiliency
resilience
pubcrawl
privacy breach data
outsourcing
Metrics
application providers
Key Distribution
Human behavior
encryption
distributed key management approach
Databases
data privacy
data owners
Cryptography
Cloud Security
cloud provider
Cloud Computing
classified records
biblio
Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
secondary causes
program diagnostics
program verification
proximate causes
pubcrawl
related dynamic properties
resilience
Resiliency
rigorous definitions
Scalability
program debugging
soft-ware weaknesses
Software
software vulnerabilities
software weaknesses
taxonomy
tertiary causes
unambiguous definitions
verification bugs
VRF
cryptography related classes
authentication
attacks
bug classes
Bug taxonomy
bugs framework
clear descriptions
Computer bugs
Cryptography
cryptography classes
BF taxonomy
developed BF classes
ENC
encryption
Encryption bugs
Human behavior
key management
key management bugs
KMN
Metrics
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
Internet world
security services
secure communication channels
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
process monitoring
process control
Monitoring
Metrics
KMS
key management
Access Control
internet
integrated circuits
industrial process
Industrial Control Systems
ICs
IBE
IBC
Human behavior
efficient key management system
cyber security challenges
cyber security
Cryptography
authorisation
authentication
biblio
Search Lookaside Buffer: Efficient Caching for Index Data Structures
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
resilience
pubcrawl
Resiliency
Human behavior
Scalability
key management
Metrics
caching
index data structure
Key-value Store
biblio
Cryptographically Secure Information Flow Control on Key-Value Stores
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
digital signatures
Cryptography
Human behavior
information-flow control
key management
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
physical layer security
cross-layer
cyber-physical systems
Human behavior
key establishment
key management
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
wireless devices
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »