Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication delay
biblio
Fast Cross Layer Authentication Scheme for Dynamic Wireless Network
Submitted by grigby1 on Tue, 02/16/2021 - 12:47pm
dynamic wireless communication
dynamic networks
upper layer authentication
upper layer assisted method
static communications
spoofing detection
PLA models
physical layer authentication mechanisms
physical layer authentication
performance stability
network environments
lightweight cross-layer authentication scheme
hypothesis test models
fast cross layer authentication scheme
dynamic wireless network
pubcrawl
dynamic communication scenarios
cross layer authentication
authentication delay
mobile radio
wireless channels
computational complexity
radio networks
composability
Cryptographic Protocols
telecommunication security
message authentication
Resiliency
resilience
Metrics
biblio
An Access Authentication Algorithm Based on a Hierarchical Identity-Based Signature over Lattice for the Space-Ground Integrated Network
Submitted by grigby1 on Wed, 03/04/2020 - 4:14pm
SGIN
lattice based mobile access authentication mechanism
lattice-based cryptography
Lattices
mobile access authentication protocol
mobile radio
mobile users
multi-access systems
private key cryptography
Protocols
L-HIBS scheme
shared session key exchange
SIS problem
small integer solution
space communication links
space-ground integrated network
standard security model
telecommunication security
theoretical cryptography
Compositionality
pubcrawl
access authentication
access authentication algorithm
adaptive selection messages
authentication
authentication delay
bidirectional authentication
composability
signature based defense
computer architecture
Cryptographic Protocols
Cryptography
digital signatures
Generators
hierarchical access authentication architecture
hierarchical identity-based cryptography
hierarchical identity-based signature