Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
local networks
transmission protocol
Symmetric Key Cryptography
secure data transmission
Resiliency
public key cryptography
pubcrawl
Protocols
node-to-node secure data transmission protocol
Node to node data transmission
Metrics
message authentication
low-power IoT devices
low-power devices
authentication
Kerberos
IoT devices exchange data
IoT
Internet of Things
internet
Human behavior
encryption
decryption
data communication
Cryptographic Protocols
computer network security
authorisation
biblio
The improvement of wireless LAN security authentication mechanism based on Kerberos
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
request message
Metrics
OPNET simulation
password
Protocols
pubcrawl
public key cryptography
public key encryption
replay attacks
message serial number
Resiliency
retransmission message
Servers
transfer message
vulnerable password guessing attacks
wireless LAN
wireless LAN security authentication mechanism
EAP-TLS authentication protocol
asymmetric key encryption method
authentication
authentication server
computer network security
Cryptographic Protocols
Cryptography
dictionary attacks
EAP
802.1X / EAP authentication protocol
Human behavior
KEAP protocol
Kerberos
Kerberos extensible authentication protocol
Kerberos protocol authentication
man-in-the-middle attack
message sequence number
biblio
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
identity-based encryption schemes
Telecommunications
standards
smart meters
smart cards
Scalability
Resiliency
public key cryptography
pubcrawl
performance evaluation
pairing-based elliptic curve cryptography
Metrics
Bilinear Pairing
group signatures
embedded devices
Elliptic curves
Elliptic curve cryptography
digital signatures
Cryptography
Cryptographic Protocols
cryptographic libraries
Constrained Devices
bilinear pairing operation
biblio
Mathematical Modeling of Group Authentication Based on Isogeny of Elliptic Curves
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
message authentication
Task Analysis
Scalability
Resiliency
quantum computing
public key cryptography
pubcrawl
Protocols
postquantum systems
Metrics
authentication
mathematical modeling
isogeny graphs
Isogeny
hierarchical group authentication scheme
graph theory
Elliptic curves
Elliptic curve cryptography
Complexity theory
biblio
Enhanced pseudorandom number generator based on Blum-Blum-Shub and elliptic curves
Submitted by aekwall on Wed, 05/01/2019 - 12:37pm
Metrics
Urban areas
statistical testing
squaring operation
Scalability
Resiliency
randomness tests
randomness
random processes
random number generation
public key cryptography
pubcrawl
pseudorandom number generator
NIST statistical test suite
BBS-ECPRNG approach
Mathematical model
Generators
Galois fields
enhanced pseudorandom number generator
Elliptic curves
elliptic curve points
elliptic curve point operations
Elliptic curve cryptography
Curve fitting
cryptographically secure bits
complex pseudorandom number generator
Blum-Blum-Shub
biblio
A Consideration of an Efficient Arithmetic Over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography
Submitted by aekwall on Wed, 05/01/2019 - 12:37pm
Gaussian processes
Vectors
Scalability
Resiliency
Random access memory
public key cryptography
pubcrawl
Proposals
Metrics
Conferences
finite element analysis
Elliptic curves
elliptic curve pairing cryptography
Elliptic curve cryptography
Cyclic Vector Multiplication Algorithm
cubic extension
Cryptography
biblio
Secure and Lightweight Biometric-Based Remote Patient Authentication Scheme for Home Healthcare Systems
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
remote medical treatment
Metrics
Mobile handsets
mobile healthcare system communication
patient care
pubcrawl
public key cryptography
public mobile healthcare environments
Remote authentication
Medical services
resilience
Resiliency
Scalability
secure based remote patient authentication scheme
security
security of data
Servers
healthcare system
biometric
biometric encryption
biometrics (access control)
digital systems
e-Healthcare
elliptic curve encryption
Elliptic curves
health care
authentication
home computing
home healthcare system
lightweight biometric-based remote patient authentication scheme
medical computing
medical data
Medical diagnostic imaging
medical information systems
biblio
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM
Submitted by aekwall on Mon, 03/18/2019 - 9:53am
key sizes
black box encryption
quantum random oracle models
quantum cryptography
quantum computing
public key cryptography
Public key
postquantum security
post-quantum cryptographic schemes
post-quantum cryptographic primitives
post quantum cryptography
module lattices
Learning with errors
Lattices
key-establishment protocols
key-encapsulation mechanism
digital signature
key encapsulation
CRYSTALS - Kyber
CPA-secure public-key encryption scheme
ciphertext sizes
CCA-secure module-lattice-based KEM
CCA-secure KEM
authenticated-key-exchange schemes
Metrics
composability
pubcrawl
Resiliency
Electronic mail
Protocols
Cryptographic Protocols
encryption
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
linear codes
theoretical cryptography
structural attacks
strong mathematical background
side-channel attacks
public-key cryptosystem
public-key cryptography
post-quantum standardization
Post-quantum cryptography
polynomials
polynomial time
oldest quantum-resistant proposition
number theory problems
number theory
NIST's announcement
McEliece scheme
pubcrawl
elliptic curve
discrete logarithm
coding theory
code-based cryptography
adequate post-quantum cryptographic schemes
quantum cryptography
side-channel analysis
public key cryptography
quantum computer
Decoding
Computers
Compositionality
physical attacks
encryption
composability
biblio
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
Submitted by grigby1 on Fri, 02/08/2019 - 4:35pm
smart meter
nonlight-weight protocol
portable access
pubcrawl
public key cryptography
Security analysis
smart cards
Smart Grid
smart grid technology
mobile computing
smart power grids
subsequent communication
telecommunication security
two factor authentication
two-factor lightweight user authentication scheme
two-factor user authentication
user anonymity
anonymous and untraceability
message authentication
Lightweight Encryption
lightweight anonymous mobile user authentication scheme
Human Factors
Human behavior
electric vehicle
data privacy
Cryptographic Protocols
critical security
communication process
cloud server
charging process
biometric encryption
authorisation
authentication process
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »