Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

IPsec

biblio

Visible to the public PIPSEA: A Practical IPsec Gateway on Embedded APUs

Submitted by grigby1 on Thu, 05/18/2017 - 2:17pm
  • APU
  • Cryptography
  • gpu
  • Heterogeneous computing
  • IPsec
  • Metrics
  • multicore
  • multicore computing security
  • openCL
  • pubcrawl
  • Resiliency
  • Scalability
biblio

Visible to the public Formal Verification of Wireless Sensor Key Exchange Protocol Using AVISPA

Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
  • IP-based wireless sensor networks
  • WSNs
  • wireless sensor networks
  • wireless sensor key exchange protocol
  • Wireless communication
  • security
  • Protocols
  • lightweight key exchange protocol WSKE
  • IPSEC-6LoWPAN networks
  • IPsec
  • authentication
  • IP networks
  • Internet key exchange version 2 mechanism
  • internet
  • IKEv2
  • formal verification
  • end-to-end security
  • Cryptographic Protocols
  • Communication system security
  • AVISPA
biblio

Visible to the public Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail

Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
  • privacy
  • Web sites
  • Web site identification
  • Web pages
  • Vectors
  • upstream bandwidth
  • traffic morphing scheme
  • traffic analysis countermeasures
  • traffic analysis attack
  • TLS
  • telecommunication traffic
  • TA attack
  • Support vector machines
  • SSH
  • security
  • Accuracy
  • padding
  • machine learning
  • IPsec
  • hypermedia
  • HTTP traffic
  • general-purpose TA countermeasures
  • encryption
  • encrypted tunnel
  • encrypted traffic
  • downstream bandwidth
  • Cryptography
  • Bandwidth
  • attack/countermeasure pairings
  • « first
  • ‹ previous
  • 1
  • 2

Terms of Use  |  ©2023. CPS-VO