Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hash chain
biblio
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks
Submitted by grigby1 on Fri, 08/11/2023 - 1:54pm
Internet of Things
security
pubcrawl
resilience
Resiliency
authentication
Complexity theory
Compositionality
Internet of Things (IoT)
Hash functions
hash algorithms
Mission critical systems
Power supplies
hash chain
biblio
Malicious Vehicles Identifying and Trust Management Algorithm for Enhance the Security in 5G-VANET
Submitted by grigby1 on Wed, 08/10/2022 - 2:42pm
vehicular ad hoc networks
Trust Routing
Secret key
NOMA
Node trust
group re-cipher key
group public key
information trust
hash chain
Interference
security
Clustering algorithms
Prediction algorithms
composability
digital signature
Scalability
Conferences
Resiliency
resilience
pubcrawl
biblio
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
Submitted by grigby1 on Thu, 08/13/2020 - 5:22pm
revocation overhead
privacy
privacy-preserving authentication
private key cryptography
pseudonymous certificates
pseudonyms
pubcrawl
Public key
resilience
Resiliency
n) threshold secret sharing
Roads
Scalability
secret sharing
Shamir (t
telecommunication security
VANET
vehicular ad hoc networks
vehicular communications
DCS schemes
anonymous messaging
authentication
authentication overhead
authorisation
backward security
certificate revocation list
certificate updating overhead
CPPT
data privacy
anonymous communications
ECPP scheme
EMAP scheme
forward security
framed attacks
hash chain
hash chains
hybrid scheme
message authentication
biblio
Detection of False Data in Wireless Sensor Network Using Hash Chain
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
hash chain
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
sensor nodes
Resiliency
resilience
pubcrawl
Mathematics
Human behavior
Hostile Environment
authentication
False Data Injection
false data filtering schemes
False Data Detection
encryption
data integrity
cyber physical systems
Cryptography
composability
bogus data
Base stations