Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
identity-based cryptosystem
biblio
An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs
Submitted by grigby1 on Thu, 09/16/2021 - 11:10am
Public key
vehicular ad hoc networks
vehicle
Signcryption
Resiliency
resilience
Repudiation
Receivers
public key infrastructure
composability
pubcrawl
privacy
Metrics
identity-based cryptosystem
Human behavior
heterogeneous communication
Computational efficiency
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
mobile ad hoc networks
manet privacy
secure identity-based deniable authentication protocol
identity-based cryptosystem
identity-based cryptography
IBDA protocol
heavy computational communication overhead
Deniable authentication
Bilinear Pairing
adequate security
mobile nodes
Compositionality
mobile devices
elliptic curve
mobile ad hoc network
mobile computing
Cryptography
MANET
Elliptic curves
Elliptic curve cryptography
public key cryptography
mobile radio
Ad hoc networks
message authentication
authentication
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Lightweight Searchable Encryption Scheme Based on Certificateless Cryptosystem
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
keyword encryption
resilience
Resiliency
composability
pubcrawl
third-party manager
secret value
searchable encryption technology
searchable encryption schemes
searchable encryption
public key cryptography
partial private key
multiuser ciphertext retrieval
lightweight searchable encryption scheme
Lightweight
Cryptography
key escrow problem
identity-based cryptosystem
file index
digital signatures
data owner stores
cloud storage environments
cloud server
ciphertext data
certificateless encryption schemes
certificateless cryptosystem
certificate management problem
cloud storage
private key cryptography
cloud data