Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cryptographic Protocols
biblio
Decentralized Identifier Distribution for Moving Target Defense and Beyond
Submitted by grigby1 on Tue, 02/23/2021 - 1:56pm
collision probability
concurrency control
Cryptographic Protocols
cryptographically secure random values
Cryptography
Databases
decentralized identifier distribution
IP networks
moving target defense
network entity identifiers
Network Identification
Network reconnaissance
network security
network security objectives
proactive defense
protocol
Protocols
pubcrawl
Reconnaissance
resilience
Resiliency
Scalability
synchronisation
Synchronization
timestamp-based concurrency control algorithms
Twitter
unique universal identifiers
biblio
Fast Cross Layer Authentication Scheme for Dynamic Wireless Network
Submitted by grigby1 on Tue, 02/16/2021 - 11:47am
pubcrawl
Metrics
resilience
Resiliency
message authentication
telecommunication security
Cryptographic Protocols
composability
radio networks
computational complexity
wireless channels
mobile radio
authentication delay
cross layer authentication
dynamic communication scenarios
dynamic wireless communication
dynamic wireless network
fast cross layer authentication scheme
hypothesis test models
lightweight cross-layer authentication scheme
network environments
performance stability
physical layer authentication
physical layer authentication mechanisms
PLA models
spoofing detection
static communications
upper layer assisted method
upper layer authentication
dynamic networks
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 3:57pm
field programmable gate arrays
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
Elliptic curve cryptography
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
crypto algorithm
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
maximum correlation
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
biblio
3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
3BI-ECC
Authentication Protocols
authentication server
authorisation
autonomous network
blockchain
blockchain technology
Blockchains Identity Management
certificate authority
computer network management
computer network security
Cryptographic Protocols
Cybersecurity
decentralize identity management system
Elliptic curve cryptography
elliptic curves cryptography
internet
Metrics
pubcrawl
public key cryptography
Resiliency
Scalability
self-generated certificates
self-generated identity
telecommunication security
three blockchains identity management
trusted third party
TTP
biblio
DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
Submitted by aekwall on Mon, 02/15/2021 - 3:48pm
Aggregation
composability
computational geometry
Cryptographic Protocols
Cryptography
cyber physical systems
data aggregation
data communication
data encryption
DEAVD protocol compresses data
decryption
Decryption Technique
efficient encryption
encryption
energy conservation
energy consumption
energy efficient encryption
environmental monitoring
military surveillance
Protocols
providing security
pubcrawl
Resiliency
secure data exchange
sensed data
Voronoi diagram
voronoi diagram paradigm
wireless sensor networks
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
computer network security
Scalability
digital signature
encryption
Internet of Things
Memory management
security
Cryptographic Protocols
Protocols
transport protocols
Resiliency
pubcrawl
digital signatures
Payloads
security mechanism
queueing theory
MQTT protocol
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
decryption time
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
Elliptic curve cryptography
pubcrawl
Scalability
Resiliency
Metrics
authentication
BB84
Cloud Computing
Cryptographic Protocols
data exchange
digital signatures
elliptic curve
elliptic curve digital signature
elliptic curve digital signature algorithm (ECDSA)
Elliptic curves
malicious client
public key cryptography
quantum computing
Quantum Key Distribution
Receivers
secure cloud data communication
biblio
Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
Computer crime
Scalability
encryption
security
Cryptographic Protocols
Resiliency
pubcrawl
bitcoin
Cryptography
cryptocurrencies
digital signatures
public key cryptography
cryptocurrency
Elliptic curves
Computers
verification time
Comparative Analysis
Post-quantum cryptography
Signature Generation
signature verification
public key cryptosystems
bitcoin transaction security
Bitcoin transactions
classical algorithms
creating digital signatures
cryptographic systems security
current day algorithms
ECDSA key generation
Hash-based Signature Schemes
hash-based signatures
MSS Key generation
post-quantum digital Signature algorithms
RSA key generation
time 0.001 s
time 0.002 s
time 0.004 s
time 0.0164 s
time 0.0187 s
time 0.0778 s
time 0.1378 s
time 0.2012 s
time 13.494 s
time 16.29 s
time 17.474 s
time 2.0E-4 s
W-OTS key generation
biblio
Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols
Submitted by grigby1 on Thu, 01/28/2021 - 12:11pm
adversary model
Adversary Models
Calculus
Communication networks
computer network security
Cryptographic Protocols
distributed processing
generic object oriented substation events and sampled value protocols
GOOSE/SV protocols
Human behavior
IEC 61850
IEC 61850 real-time communication protocols
IEC standards
IEEE/IEC 61850 standard
Metrics
network topology
Object oriented modeling
pi calculus
power engineering computing
Power system protection
power utility automation
Protocols
pubcrawl
QoS
quality of service
quality of services
Real-time communication protocols
real-time systems
resilience
Resiliency
Scalability
security
substation automation
telecommunication network topology
π-calculus process algebraic formalism
biblio
Authentication with Mildly Myopic Adversaries
Submitted by grigby1 on Thu, 01/28/2021 - 12:11pm
Adversary Models
binary channel model
channel capacity
channel coding
channel condition
channel states
Cryptographic Protocols
deterministic encoder
essentially omniscient adversary
Human behavior
keyless authentication
malicious adversary
message authentication
Metrics
mildly myopic adversaries
no-adversary capacity
noisy versions
positive authentication capacity
pubcrawl
received information
resilience
Resiliency
Scalability
stochastic encoder
sufficient condition
telecommunication channels
telecommunication security
transmitted sequences
underlying channel
unsecured communications settings
zero authentication capacity
1
2
3
4
5
6
7
8
9
…
next ›
last »