Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
CENTRA: CENtrally Trusted Routing vAlidation for IGP
Submitted by grigby1 on Wed, 04/11/2018 - 3:03pm
routing policies
PKI
practical Internet
pubcrawl
public key cryptography
public key infrastructure
real-time systems
resilience
Resiliency
Routing
routing monitoring systems
OSPF
Routing protocols
Scalability
SDN
secure routing mechanism
secure routing policy
Software Defined Network
software defined networking
Trust Routing
trusted routing
YANG
IGP
anomalous routing detection
Anomaly Detection
authentication
CENTRA
Centrally Controlling
CENtrally Trusted Routing vAlidation framework
communication protocol
composability
computer network security
Data Model
anomalous routing blockage
interior gateway protocols
internet
Internet service providers
internetworking
ISP
knowledge base-this
Monitoring
Neighbor
NETCONF
network security
biblio
A DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
finite values
fixed sized chunk
Human behavior
Metrics
Paillier
Paillier cryptosystems
plaintext
pubcrawl
equivalent binary value
random processes
random strings
Receivers
resilience
Resiliency
RSA
Transforms
asymmetric cryptosystem
equivalent ASCII values
encryption
encoding
ElGamal cryptosystems
ElGamal
dynamic DNA encoding
DNA cryptography
DNA cryptographic technique
DNA bases
DNA
data secrecy
Compositionality
Ciphertext
biocomputing
Asymmetric Encryption
biblio
\#x003BC;DTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
resilience
Metrics
microcontrollers
payload size
Payloads
performance evaluation
Protocols
pubcrawl
public key cryptography
man-in-the-middle attacks
Resiliency
Routing
secp128r1
secp192r1
secp256r1
security layer
store-carry-forward principle
μDTNSec
digital signatures
Asymmetric Encryption
asymmetric signatures
bundle protocol specification
Compositionality
Contiki OS
Cryptographic Protocols
delay tolerant networks
delay-disruption-tolerant networks
advanced encryption standard
disruption-tolerant networks
Elliptic curve cryptography
encryption
energy measurement
energy measurements
energy-constrained devices
hardware-backed symmetric encryption
Human behavior
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
biblio
A Robust and Secured Cloud Based Distributed Biometric System Using Symmetric Key Cryptography and Microsoft Cognitive API
Submitted by grigby1 on Mon, 04/02/2018 - 12:33pm
enterprise application base
Symmetric Key Cryptography
security aspects
Resiliency
resilience
registered user information
public key cryptography
pubcrawl
multiple biometric information
Microsoft Windows (operating systems)
Microsoft cognitive face-API
Microsoft cognitive face API
face recognition
face images
face biometric
Face
AES cryptography technique
encryption
distributed system
Compositionality
cloud services
cloud service provider
Cloud Security
Cloud Computing
biometrics (access control)
biometric system
biometric image
biometric authentication system
authorisation
authentication
application program interfaces
APIs
biblio
Accumulators with Applications to Anonymity-Preserving Revocation
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Human behavior
zero-knowledge proofs
user authentication
Theorem Proving
RSA-based dynamic accumulator
revocation functionality
revocation
Resiliency
resilience
public key cryptography
pubcrawl
Plugs
optimal communication complexity
Metrics
message authentication
membership revocation
accumulators
Heuristic algorithms
Cryptography
cryptographic applications
composability
Complexity theory
communication complexity
Braavos construction
authentication
ARC
anonymous revocation component
anonymous credentials
anonymous credential systems
anonymity-preserving revocation
anonymity
Additives
biblio
Privacy Preserving Localization Using a Distributed Particle Filtering Protocol
Submitted by grigby1 on Mon, 03/19/2018 - 1:59pm
Protocols
spectrum sensing information
signal detection
sensors
sensing network
semihonest adversary model
Scalability
Resiliency
resilience
radio transmitters
public-key cryptography
public key cryptography
Public key
pubcrawl
Adversary Models
privacy preserving localization
privacy
Particle measurements
particle filtering (numerical methods)
multiple sensing radios
Metrics
Human behavior
distributed particle filtering protocol
cooperative communication
cognitive radios systems
cognitive radio
Atmospheric measurements
biblio
A Practical Quantum Public-Key Encryption Model
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
public key cryptography
secret keys
Resiliency
resilience
quantum trapdoor one-way function
quantum public-key encryption model
quantum public key encryption model
Quantum mechanics
quantum information security
quantum cryptography
quantum computing
black box encryption
Public key
pubcrawl
Metrics
encryption
decryption process
Computational modeling
computational indistinguishability
composability
blackbox client-side
biblio
Secure Composition of PKIs with Public Key Protocols
Submitted by K_Hooper on Wed, 02/28/2018 - 11:32am
Public key
tools
telecommunication security
tagging
symbolic model
symbolic formal models
secure composition
public key protocols
public key infrastructures
public key cryptography
Composition
pubcrawl
Protocols
PKI
formal method
encryption
Cryptographic Protocols
Computational modeling
Compositionality
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »