Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
nonrepudiation
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Two-phase Nonrepudiation Protocols
Submitted by grigby1 on Fri, 08/18/2017 - 2:13pm
digital signature
digital signatures
nonrepudiation
pubcrawl
Resiliency
Scalability
Trusted Party
biblio
Nonrepudiation Protocols in Cloud Systems
Submitted by grigby1 on Fri, 08/18/2017 - 2:13pm
Cloud Computing
digital signature
digital signatures
nonrepudiation
pubcrawl
Resiliency
Scalability
biblio
Security solutions for Web Service attacks in a dynamic composition scenario
Submitted by BrandonB on Tue, 05/05/2015 - 8:44am
SOAPAction spoofing
security
security solutions
service oriented architecture
service-oriented architecture
Simple object access protocol
SOA
SOAP
SOAP messages
schema validation
standards
UDDI
Web service attacks
web services
WS-Addressing spoofing
WSAS API
WSDL
XML injection
Information services
application program interfaces
authentication
authorisation
authorization
confidentiality
data integrity
dynamic composition scenario
Electronic publishing
API
integrity
internet
Lead
nonrepudiation
Protocols
SAS API
schema hardening
biblio
Log Your CRUD: Design Principles for Software Logging Mechanisms
Submitted by Laurie Williams on Wed, 09/17/2014 - 6:30pm
CPS Domains
Medical Devices
Health Care
Science of Security
Foundations
electronic health record software
Software and Application Security
Science of Security
science
nonrepudiation
medical devices
logging mechanism
Healthcare
health care
foundations
accountability
Database and Storage Security
Database Activity Monitoring
cyber security
CPS Domains
case study
black-box testing
audit
ACM CCS
ACM CCS
Cyber Security
Database Activity Monitoring
Database and Storage Security
Software and Application Security