Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
biblio
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
SDKEY-based transparent encryption storage
PIN
prototype system
public key cryptography
public key exchange
Receivers
SDKEY
SDKEY device
SDKEY-based secure storage
message authentication
secure computation environment
sensitive data leakage
smart phones
storage management
system boot
transmission approach
zero-key exchange
encryption
Android phones
Android system
authentication
Ciphers
data files
Data protection
decryption operation
dual-authentication scheme
Android (operating system)
encryption operation
Encryption Storage
encryption transmission
fine-grained encryption scheme
Key exchange
key exchange mechanisms
lock screen
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Defining the framework for wireless-AMI security in smart grid
Submitted by BrandonB on Fri, 05/01/2015 - 9:50am
public key cryptography
Zigbee
WMN(Wireless Mesh Network)
wireless mesh Zigbee network topology
wireless mesh networks
Wireless communication
wireless AMI security
smart power grids
smart meters
Smart Grids
smart grid advanced metering infrastructure
security
public key infrastructure
AMI (Advanced Metering Infrastructure)
Power system protection
power engineering computing
PKI based digital certificate authentication
PKI
metering
intrusion detection system
Intrusion Detection
internal security attack
external security attack
computer network security
authentication
biblio
Signal fingerprinting in cognitive wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:48am
malicious attacks
wireless mesh networks
Wireless communication
wireless
telecommunication signalling
telecommunication security
spread spectrum communication
Signal to noise ratio
signal fingerprinting
security
RFF
public key cryptography
Public key
Protocols
active radiofrequency fingerprinting
Fingerprinting
DoS
denial-of-service attacks
Demodulation
Cryptographic Protocols
CRM
common-control-channel information
cognitive wireless networks
cognitive radio manager framework
cognitive radio
Cognitive
Amplitude shift keying
biblio
Secret key generation in correlated multi-dimensional Gaussian channels
Submitted by BrandonB on Fri, 05/01/2015 - 8:35am
secret key generation
wireless networks
Wireless communication
wireless channels
wireless channel reciprocity
wide-sense stationary wireless channels
Time-frequency Analysis
time-domain analysis
time selectivity
time domains
telecommunication security
spatial domains
spatial correlation
signal-to-noise ratio
Signal to noise ratio
security
analytical framework
radio networks
public key cryptography
public channel
multiple antenna eavesdroppers
intrinsic secrecy content
Gaussian channels
frequency-domain analysis
frequency domains
Covariance matrices
correlated multidimensional Gaussian channels
confidential communications
Communication system security
asymptotic analysis
antenna arrays
biblio
Security analysis of two certificateless short signature schemes
Submitted by BrandonB on Fri, 05/01/2015 - 8:31am
certificate management problem
certificateless public key cryptography
certificateless short signature schemes
CL short signature schemes
CL-PKC
digital signatures
IBC
identity-based cryptography
key escrow problem
public key cryptography
Security analysis
user public keys
biblio
Cryptographically-Curated File System (CCFS): Secure, inter-operable, and easily implementable Information-Centric Networking
Submitted by BrandonB on Thu, 04/30/2015 - 1:38pm
Inter-operable Heterogeneous Storage
trust boundaries
storage technologies
storage systems
storage management
Servers
Self Certifying File Systems
public keys
public key cryptography
Public key
Prototypes
network layer
Name Orientated Networking (NON)
IP networks
CCFS
integrity verification
information-centric networking
information networks
Information Centric Networks (ICN)
Google
File systems
file hashes
Delay Tolerant Networking (DTN)
cryptographically-curated file system
cryptographically strong content identifiers
Cryptographically Curated File System (CCFS)
Content Centric Networking (CCN)
content authentication
biblio
Efficient t-cheater identifiable (k, n) secret-sharing scheme for t #x02A7D; [((k - 2)/2)]
Submitted by BrandonB on Thu, 04/30/2015 - 12:48pm
k-cheating probability
k-shakeholders
Obana's scheme
probability
public key cryptography
secret reconstruction
secret-sharing scheme
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 11:53am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
next ›
last »