Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
key escrow problem
certificateless aggregate signature scheme
certificateless public key cryptography
digital signature schemes
hierarchical organization
hierarchical trusted authority based VANET
hierarchical trusted authority privacy
high vehicle density scenarios
identity based cryptography
certificateless aggregate message authentication
message forgeability attack
multiple trusted authorities
neighboring vehicles
OBU device
side channel attacks
traditional PKC concept
Repudiation
digital signatures
telecommunication security
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
Metrics
message authentication
data privacy
public key cryptography
VANET
RSU
Aggregate Signature
aggregate verification
beacon messages
certificate management overhead
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
pseudonyms
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
computational overhead
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
security
VANET
public key cryptography
attacks
authentication
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
Cryptography
biblio
Enhanced Lightweight Cloud-assisted Mutual Authentication Scheme for Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
tools
wearables security
Wearable devices
wearable computers
symmetric cryptography
secure authentication process
lightweight cloud-assisted mutual authentication scheme
IoT authentication
cloud-assisted authentication scheme
Authentication Protocols
Wireless fidelity
IoT security
public key cryptography
message authentication
authentication
security
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
Protocols
Cryptographic Protocols
telecommunication security
data privacy
Servers
Scalability
Cloud Computing
IoT
biblio
A Residential Client-Side Perspective on SSL Certificates
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
shorter average chain length
public key infrastructure
residential client-side
resilience
Resiliency
root certificates
Scalability
secure web connection setup
Servers
public key cryptography
SSL certificate chains
SSL certificates
SSL Trust Models
telecommunication traffic
transport protocols
untrusted root certificate
valid certificates
2M residential client machines
Public key
pubcrawl
Protocols
operating systems
Metrics
invalid certificate chains
internet
Human Factors
Human behavior
Ecosystems
computer network security
certification
certificate characteristics
Browsers
35M unique certificate chains
biblio
A High-Speed Key Management Method for Quantum Key Distribution Network
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
quantum key distribution network
one-time pad tunnel manager
Photonics
private key cryptography
pubcrawl
public key cryptography
QKD key generation
QKD network
quantum cryptography
Quantum Key Distribution
one-time pad
Receivers
resilience
Resiliency
Scalability
secure communication
transparent encryption link
unconditional secure communication
Web API
high-speed key management method
application communication
application key consumption
application program interfaces
data communication
eavesdropping
encryption
encryption key sharing
global key manager
adjacent nodes
high-speed method
high-speed QKD system
Human behavior
Human Factors
key management
local key manager
Metrics
network systems
biblio
Research in Fast Modular Exponentiation Algorithm Based on FPGA
Submitted by grigby1 on Tue, 01/21/2020 - 11:50am
Montgomery algorithm
systolic arrays
systolic array
Scalability
Resiliency
resilience
Q measurement
public-key cryptosystem
public-key cryptography
public-key algorithm
public key cryptography
pubcrawl
Montgomery modular multiplication
automation
Modular Multiplication
modular exponentiation on large number
modular exponentiation
mechatronics
logic design
frequency 170.0 MHz
FPGA
field programmable gate arrays
fast modular exponentiation algorithm
exponentiation
Erbium
Conferences
biblio
Polynomial-based Lightweight Key Management in a Permissioned Blockchain
Submitted by aekwall on Mon, 01/20/2020 - 11:49am
polynomial
transaction confidentiality
telecommunication security
system scalability
security
Scalability
Resiliency
public-key schemes
public-key operations
public-key infrastructure
public key cryptography
pubcrawl
polynomials
polynomial-based schemes
128-bit modulus size
PKI
permissioned blockchain platform
lightweight polynomial-based key management scheme
identity authentication
exponentiation
expensive modular exponentiation operations
data confidentiality
Cryptography
cryptocurrencies
computationally less intensive polynomial evaluation operations
blockchain applications
blockchain
2048-bit RSA
biblio
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
public key cryptography
Stochastic processes
stochastic method
stochastic heuristic approach
Side-channel attack
security effectiveness
Scalability
SCA
RSA cryptosystem
RSA
Resiliency
public-key cryptosystem
public-key cryptography
ACP
pubcrawl
PKC
multiplication-squaring operations
modular exponentiation
microsoft windows
Heuristic algorithms
exponentiation operation
exponentiation
dummy operations
Benchmark testing
addition chain problem
biblio
Parallel DNA Computing Model of Point-Doubling in Conic Curves Cryptosystem over Finite Field GF(2ˆn)
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
mathematical curves
Tile Assembly Model
self-assembly
Resiliency
resilience
public key cryptography
pubcrawl
privacy
Predictive Metrics
point-multiplication
point-doubling
point-addition
Point doubling
parallel DNA computing model
Metrics
biocomputing
Human behavior
Galois fields
Finite Field GF(2ˆn)
finite field GF
encoding
Elliptic curves
Elliptic curve cryptography
DNA cryptography
DNA computing
DNA
Cryptographic Protocols
conic curves cryptosystem over finite held
Conic Curves Cryptosystem
Computational modeling
biblio
Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
Elliptic curve cryptography
public signature verification problem
proxy signature scheme
private key exposure
FoSPS
forward secure proxy signature
directed signature scheme
cryptoanalysis
Computer security and privacy
handwriting recognition
ECC
Scalability
Security analysis
public key cryptography
digital signatures
pubcrawl
Resiliency
private key cryptography
data privacy
Computational efficiency
digital signature
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »