Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
end-to-end security
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
computer network security
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
security threats
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
3D PAKE protocol
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
heterogeneous networked society
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
biblio
Permissioned Blockchains and Virtual Nodes for Reinforcing Trust Between Aggregators and Prosumers in Energy Demand Response Scenarios
Submitted by aekwall on Mon, 09/28/2020 - 11:17am
data privacy
Internet of Things
IoT devices
security
Human behavior
pubcrawl
blockchain
privacy
smart power grids
Stakeholders
smart contracts
power engineering computing
Smart Grids
power grids
Permissioned Blockchains
distributed power generation
energy management systems
power system stability
smart meters
Human Factors
demand side management
demand response
Fog computing
energy system
contracts
blockchains
interoperability
open systems
renewable energy sources
end-to-end security
cyber physical systems
active consumer participation
auditable DR framework
DERs
design innovative DR schemes
DR services
DR signals
energy demand response scenarios
energy stakeholders
energy supply
energy waste
grid stability
legacy energy systems
Load management
modern smart grid technologies
modern smart grids
reliable DR framework
RES
scale deployment
smart contract-based DR framework
software stakeholders
tamper-resistant DR framework
virtual node
virtual nodes
CPS Privacy
biblio
An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment
Submitted by grigby1 on Thu, 07/30/2020 - 1:15pm
ciphertext-policy attribute based encryption
composability
computer network security
Cryptographic Protocols
data communication
data exchange protocol
electronic data interchange
encryption
end-to-end security
Human behavior
Human Factors
Internet of Things
Internet of things environment
IoT application developers
IoT security
massive IoT devices
Message Queue Telemetry Transport
Metrics
MQTT broker
MQTT protocol
MQTT Thing-to-Thing Security
MQTT-TLS
MQTT-TTS
Payloads
Protocols
pubcrawl
queueing theory
resilience
Resiliency
secure data exchange
telemetry
thing-to-broker channel encryption
Thing-to-Thing Security enhancement
Transport Layer Security
biblio
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
Submitted by aekwall on Mon, 04/13/2020 - 9:06am
Scalability
Cryptography
encryption
data privacy
Protocols
Resiliency
pubcrawl
electronic messaging
Interviews
authentication
whatsapp
end-to-end security
cognitive science
communication model
End user Studies
end-to-end encryption
HCI
Mental model
post-mass messenger encryption
post-MME
pre-mass messenger encryption
pre-MME
secure messaging
signal protocol
skilled attackers
usable security and privacy
User Perception
Security by Default
biblio
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Submitted by grigby1 on Mon, 03/23/2020 - 3:16pm
computer network security
cryptographic processing
Cryptographic Protocols
Cryptography
data privacy
end-to-end security
Internet connectivity
Internet of Things
IoT communication
IoT device owner
Metrics
protocol incompatibilities
Protocols
pubcrawl
resilience
Resiliency
resource-conserving access control
resource-constrained IoT devices
Router Systems Security
Routing
secret supply chain procedures
Servers
tailoring onion routing
telecommunication control
untrusted environments
untrusted networks
Web server
biblio
Research on End-to-End Security Authentication Protocol of NB-IoT for Smart Grid Based on Physical Unclonable Function
Submitted by aekwall on Mon, 02/17/2020 - 1:17pm
Scalability
Internet of Things
Cryptographic Protocols
Resiliency
pubcrawl
privacy
Metrics
smart power grids
message authentication
smart grid security
Smart Grid
power engineering computing
encryption keys
end-to-end security
domestic cryptographic algorithm
electric power business
end-to-end security authentication protocol
narrow band internet of things
national strategic hot spot
NB-IoT terminals
Physical Unclonable Function
power grid business platforms
power network data transmission
secure data transmission
security authentication protocol
self-controllable NB-IoT application layer security architecture
SM3
smart power utilization
biblio
IoTSM: An End-to-End Security Model for IoT Ecosystems
Submitted by grigby1 on Wed, 10/30/2019 - 9:30am
collaboration
Companies
comparability
composability
Ecosystems
end-to-end IoT security
end-to-end security
end-to-end security model
Human behavior
Internet of Things
Interviews
IoT
IoT devices
IoT ecosystems
IoT organizations
IoT practitioners
IoT security
IoT security model
IoTSM
Metrics
Pervasive Computing Security
pubcrawl
Resiliency
Scalability
Science of Security
secure development
security
security model
security of data
Security Practices
Software
software assurance
software assurance maturity model framework
telecommunication security
biblio
A Monitoring Approach for Policy Enforcement in Cloud Services
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
authorisation
authorization
Biomedical monitoring
Cloud Computing
cloud services
cloud-based service orchestrations
collaboration
data privacy
end-to-end security
end-to-end service invocation chain
interaction authorization policies
Monitoring
policy enforcement monitoring
policy-based governance
Privacy Policies
pubcrawl
quality of service
real-world service composition scenario
security of data
security policies
Security Policies Analysis
security policy
service guarantees
service interactions
service performance policies
service-oriented architecture
SOA
SOA services
Software Architecture
web services
biblio
Formal Verification of Wireless Sensor Key Exchange Protocol Using AVISPA
Submitted by BrandonB on Wed, 05/06/2015 - 1:43pm
authentication
AVISPA
Communication system security
Cryptographic Protocols
end-to-end security
formal verification
IKEv2
internet
Internet key exchange version 2 mechanism
IP networks
IP-based wireless sensor networks
IPsec
IPSEC-6LoWPAN networks
lightweight key exchange protocol WSKE
Protocols
security
Wireless communication
wireless sensor key exchange protocol
wireless sensor networks
WSNs
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
AGA-12
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
end-to-end security
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
NTRU public key algorithm
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
SCADA communication protocols over TCP/IP
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
1
2
next ›
last »