Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections
Submitted by grigby1 on Wed, 10/23/2019 - 12:38pm
revoked certificates checking
log-based schemes
Metrics
Monitoring
Protocols
pubcrawl
public key cryptography
query processing
resilience
Resiliency
log servers
Scalability
Security analysis
Servers
SSL connections
SSL Trust Models
system monitoring
telecommunication security
TLS connections
data consistency
blockchain system
blockchain-based public
Certchain
certificate audit service
certificate forward traceability
certificate revocation checking
certificate revocation mechanisms
certification
Cryptographic Protocols
auditing
data privacy
data structure
data structures
DCBF
dependability-rank based consensus protocol
dual counting bloom filter
Electronic mail
Human behavior
biblio
Prominence Of ECDSA Over RSA Digital Signature Algorithm
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
Human behavior
RSA Digital Signature Algorithm
RSA
Resiliency
resilience
Repudiation
public key cryptography
public key cryptographic algorithms
pubcrawl
non-repudiation
Metrics
composability
handwriting recognition
Elliptical Curve Digital Signature Algorithm
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDLP
ECC
digital signatures
cryptosystem
Conferences
biblio
Hardware Implementation of Dynamic Key Value Based Stream Cipher Using Chaotic Logistic Map
Submitted by grigby1 on Tue, 10/08/2019 - 4:44pm
Random sequences
NIST statistical
nonrecursive key
private key cryptography
PRNG
pseudorandom number generation
pseudorandom sequence generation
pubcrawl
public key cryptography
random key generation
random number generation
Metrics
randomness tests
resilience
Resiliency
Scalability
stream cipher
symmetric key chaos based cryptography
Thermal analysis
Verilog HDL
X-power
Xilinx device
FPGA device
binary sequence
binary sequences
chaos
Chaos based cryptography
chaotic logistic map
Ciphers
dynamic key value based stream cipher
embedded systems
field programmable gate arrays
Field programmable gated array
asymmetric key chaos based cryptography
frequency 62.2 MHz
Hardware
Hardware Security
hardware-based embedded system
Human behavior
key scheduling
key stream
logistic map
Logistics
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Probably Secure Multi-User Multi-Keyword Searchable Encryption Scheme in Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
Multi-user
Trapdoor indistinguishability
simulation program
Servers
security
secure multiuser multikeyword searchable encryption scheme
searchable encryption server
Resiliency
resilience
Receivers
random oracle model
public key cryptography
Public key
pubcrawl
privacal data
searchable encryption
multi-keyword
Indexes
encryption workload
encryption
decisional Diffie-Hellman
data user
data privacy
data owner
Cryptography
composability
cloud storage
Cloud Computing
cipher text keyword
biblio
Security-Enhanced Signaling Scheme in Software Defined Optical Network
Submitted by grigby1 on Wed, 09/11/2019 - 2:44pm
security level
pubcrawl
public key cryptography
public key infrastructure
resilience
Resiliency
SDON
security
security improvement
Protocols
security-enhanced signaling
security-enhanced signaling procedure
Software
software defined networking
Software Defined Networks
software defined optical network
telecommunication security
telecommunication signalling
internet
communication security issue
composability
connection success rate performance
Cryptographic Protocols
current OpenFIow protocol
digital signatures
end-to-end trusted service connection
Energy Internet services
backbone optical networks
large-scale optical network
message feedback
Metrics
Microelectronics Security
openflow protocols
Optical feedback
Optical fiber networks
optical switches
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Protocols
threshold cryptography
threshold
telecommunication security
Servers
security protocols
security of data
securities issues
RSA cryptography
RSA
Resiliency
public key cryptography
pubcrawl
authentication
protocol models
protocol
Metrics
Kerberos authentication protocol
Kerberos
Human behavior
high security
Elliptic curve cryptography
ECC
Cryptographic Protocols
Cloud Security
Cloud Computing
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »