Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
Secure IoT for a Pervasive Platform
Submitted by grigby1 on Tue, 11/26/2019 - 3:42pm
pubcrawl
ubiquitous computing
software elements
Software
smart communication-enable devices
Servers
security
secure IoT
secure element
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
computer architecture
pervasive systems
pervasive platform
Pervasive Computing Security
pervasive computing
pervasive applications
Metrics
Internet of Things
Human Factors
human factor
Human behavior
Hardware
end-to-end security level
computer network security
biblio
RDI: Real Digital Identity Based on Decentralized PKI
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
Brute-force Attack
PKI Trust Models
username-password approach
trusted source certificate authorities
Real Digital Identity based approach
RDI
public key binding
public key approach
point of trust attack
online transactions
Online banking
Internet banking applications
Digital identity
decentralized PKI scheme
decentralized PKI
automobiles
Registers
public key cryptography
Public key
smart contracts
message authentication
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
authorisation
Scalability
biblio
TRUFL: Distributed Trust Management Framework in SDN
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
cloud environment
PKI Trust Models
trust management schemes
Trust management
TRUFL framework scales
transfer rates
public key infrastructure
distributed trust mechanism
distributed trust management framework
digital signatures
data plane-control plane elements
Control Plane-Application Plane
control plane elements
cloud infrastructure
centralized trust management
trust establishment
computer network security
public key cryptography
Public key
SDN
Metrics
pubcrawl
Human behavior
Resiliency
software defined networking
computer network management
Trusted Computing
Protocols
authorization
Scalability
Cloud Computing
biblio
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
privacy preservation
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
Trust management
telecommunication security
security services
Scalability
revocation transparency
Resiliency
reputation system
public key infrastructure
public key cryptography
Public key
pubcrawl
privacy protection
authentication protocol
privacy
PKI Trust Models
Metrics
message authentication
internal vehicles
Human behavior
forged message broadcasting
distributed trust management
data privacy
Data models
Cryptographic Protocols
blockchain-based anonymous reputation system
blockchain
Bars
biblio
Conifer: Centrally-Managed PKI with Blockchain-Rooted Trust
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
public keys
centralized transparency
centrally-managed PKI
Conifer
CONIKS
cryptographic identities
domain names
highly decentralized trust
insecure networks
central trusted parties
secure distributed ledger
secure naming systems
security guarantees
traditional centralized PKIs
traditional centralized-trust systems
trustworthy binding
user-facing names
PKI Trust Models
internet
Scalability
secure communications
Resiliency
Human behavior
pubcrawl
bitcoin
Metrics
blockchain
Monitoring
data structures
Public key
public key cryptography
flexibility
active attackers
blockchain-agnostic way
blockchain-rooted trust
blockchains
biblio
Blockchain-Based PKI Solutions for IoT
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
public key cryptography
PKI Trust Models
scalable PKI
robust PKI
publicly verifiable trusted third parties
public key certificates
peer-to-peer data store
Ethereum Light Sync client
Ethereum blockchain
Emercoin Name Value Service
decentralized trusted third parties
consensus protocols
certification authority
blockchain-based PKI solutions
blockchain-based alternatives
public key infrastructure
IoT
Public key
smart contracts
blockchain
Metrics
Peer-to-peer computing
bitcoin
pubcrawl
Human behavior
Resiliency
Trusted Computing
Protocols
data integrity
Internet of Things
Scalability
computer network security
biblio
Turning Trust Around: Smart Contract-Assisted Public Key Infrastructure
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
contracts
PKI Trust Models
trust experience
smart contract-assisted public key infrastructure
smart contract-assisted PKI extension
PKI
dynamic trust state
dynamic trust network
dynamic trust management
Decentralized Trust
CT
certification
certificate transparency
certificate authority
Browsers
Scalability
public key cryptography
Public key
digital signatures
Policy
Ecosystems
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Protocols
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
biblio
Certificate Transparency Using Blockchain
Submitted by grigby1 on Wed, 10/23/2019 - 12:39pm
Protocols
web domains
web communication
telecommunication security
SSL-TLS protocols
SSL Trust Models
Servers
Scalability
safe distributions
Resiliency
resilience
public logs
public keys
public key cryptography
Public key
pubcrawl
authorisation
PKI
Metrics
IBM Hyperledger Fabric blockchain platform
hyperledger
Human behavior
Google
Computed tomography
certification authorities
certification
certificate validation process
certificate transparency
certificate revocation mechanism
certificate authorities
Browsers
blockchain
biblio
(Short Paper) Towards More Reliable Bitcoin Timestamps
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
pubcrawl
Web sites
timestamping service
timestamping
Synchronization
SSL/TLS servers
SSL Trust Models
Servers
secure timestamping service
Scalability
Resiliency
resilience
Reliability
public key cryptography
authorisation
Protocols
Metrics
Human behavior
freshness properties
freshness
electronic money
digital signatures
Cryptographic Protocols
blockchain
bitcoin timestamps
Bitcoin protocol
Bitcoin participants
bitcoin
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »