Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
attribute based encryption
collaboration
digital signature
digital signatures
gaussian sampling
Human behavior
lattice-based cryptography
policy-based governance
pubcrawl
Resiliency
ring-lwe
Scalability
trapdoor
biblio
Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Resiliency
Human behavior
information
information and communication systems
Metrics
pubcrawl
Public key
public key cryptography
public key cryptography system
resilience
encryption process
Rivest
RSA
RSA 1024
RSA algorithm
RSA encryption
Scalability
security
security system analysis
Shamir
digital signature
Asymmetric Encryption
asymmetric keys
authentication
combination method
Communication networks
composability
Compositionality
Data Security
decryption process
and Adleman algorithm
digital signatures
digital signature algorithm
Digital Signature Standard
DSA
DSA 512
DSA algorithms
DSS
encryption
biblio
Detection of Distributed Denial of Service (DDoS) Attacks Using Artificial Intelligence on Cloud
Submitted by grigby1 on Fri, 02/08/2019 - 4:14pm
Detectors
Spark
signature-based approach
signature
Resiliency
pubcrawl
neural nets
Neural
Metrics
Intrusion Detection
Human behavior
feature extraction
distributed denial of service attacks
digital signatures
Amazon public cloud
DDoS attack detection
DDoS
computer network security
Computer hacking
Computer crime
composability
Cloud Computing
cloud
Artificial Neural Networks
artificial intelligence security
Artificial Intelligence
anomaly-based distributed artificial neural networks
Anomaly
biblio
Analysis of computer security incidents using fuzzy logic
Submitted by grigby1 on Fri, 10/26/2018 - 5:00pm
information security
the development of cyber-attack signatures
security
Russian ViPNet technology
Russian Federation
Resiliency
recommender systems
pubcrawl
Protocols
processing algorithm
Metrics
Information services
Algorithm design and analysis
Fuzzy logic
digital signatures
detection and prevention of cyber-attacks
design pattern SOPKA
cyberattacks
cyber-attacks
Computers
computer security incidents
computer security incident analysis
computer security
author signatures
biblio
Use of Analog Signatures for Hardware Trojan Detection
Submitted by grigby1 on Fri, 09/28/2018 - 3:13pm
resilience
pubcrawl
Scalability
Hardware Trojans
digital signatures
Analog Signatures
Ballistocardiography
Reconfigurable Logic
biblio
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability Without Big Brother
Submitted by grigby1 on Fri, 09/28/2018 - 3:13pm
anonymous messaging
Anomaly Detection
anonymization
digital signatures
privacy-preserving protocols
pubcrawl
resilience
Scalability
biblio
A Subliminal Channel in EdDSA: Information Leakage with High-Speed Signatures
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
resilience
network security
cyber-physical systems
pubcrawl
Scalability
digital signatures
Information Leakage
network protocols
censorship circumvention
Data Exfiltration
ed25519
eddsa
Information hiding
subliminal channels
biblio
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
resilience
pubcrawl
revocation
Scalability
digital signatures
group signatures
time-bound keys
biblio
Security in Personal Genomics: Lest We Forget
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
resilience
pubcrawl
Scalability
integrity
authenticity
digital signatures
authenticated data structures
digital signature chaining
genomic security
biblio
Design of heterogeneous integrated digital signature system for ensuring platform independence
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
per-user contract management features
WAS
User Terms
software maintenance
software extension
Software
Scalability
resilience
pubcrawl
platform independence
platform
browser environment
Insurance
HTML5
heterogeneous integrated digital signature system
digital transactions
digital signatures
digital signature
contracts
Companies
Browsers
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »