Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Secure Architectures of Future Emerging Cryptography SAFEcrypto
Submitted by grigby1 on Mon, 05/22/2017 - 12:55pm
attribute based encryption
composability
digital signatures
identity based encryption
Key exchange
lattice based cryptography
Metrics
post quantum cryptography
pubcrawl
quantum computing security
Resiliency
SAFEcrypto
Scalability
biblio
"Make Sure DSA Signing Exponentiations Really Are Constant-Time"
Submitted by grigby1 on Wed, 05/17/2017 - 12:52pm
Applied cryptography
cache-timing attacks
CVE-2016-2178
digital signatures
DSA
exponentiation
Human behavior
Kerberos
Metrics
OpenSSL
pubcrawl
Resiliency
side-channel analysis
timing attacks
biblio
Attacking OpenSSL Implementation of ECDSA with a Few Signatures
Submitted by grigby1 on Wed, 05/17/2017 - 12:49pm
collaboration
composability
cryptology
digital signatures
ECDSA
extended hidden number problem
f lush+r eload attack
Human behavior
lattice attack
Metrics
OpenSSL
pubcrawl
Resiliency
Scalability
windowed non-adjacent form
biblio
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
Submitted by grigby1 on Mon, 04/03/2017 - 10:52am
composability
digital signatures
electromagnetic analysis
elliptic curve
Elliptic curve cryptography
Metrics
Physical layer
physical layer security
physical-layer security
power analysis
pubcrawl
Resiliency
side channel attack
biblio
Fast Mining of Large-Scale Logs for Botnet Detection: A Field Study
Submitted by grigby1 on Wed, 03/08/2017 - 1:32pm
information quality
Workstations
Servers
pubcrawl170112
proxy
normal data streams
network-based attack
mining
malwares
malware
logs
large-scale proxy log mining
invasive software
internet
information quantity
abnormal data streams
Heuristics
feature pattern
feature extraction
digital signatures
Data mining
computer network security
computer network behavioral analysis
Cloud Computing
C and C Servers
botnet life cycle
botnet detection methods
botnet
algorithmically generated domains
AGD
biblio
Redesigning QR Code Ecosystem with Improved Mobile Security
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
mobile marketing
Software
security threat
security risks
risk analysis
redesigned QR code ecosystem
QR codes
QR code
public key infrastructure
Public key
pubcrawl170112
Mobile Security
advertising
mobile computing
life cycle
information system
Ecosystems
Ecosystem
digital signatures
digital signature mechanism
digital signature
Decoding
authentication
advertising campaigns
biblio
Secure Public Key Regime (SPKR) in vehicular networks
Submitted by grigby1 on Tue, 03/07/2017 - 12:42pm
lower authentication delay
vehicular networks
vehicles
secure public key regime
Schnorr signature
road side units
public key cryptography
Public key
pubcrawl170109
preauthentication mechanism
mobile radio
authentication
digital signatures
Denial of Service attacks
denial of service attack
delegated trusted authorities
Computer crime
complex certificate verification process
Collusion Attacks
collusion attack
certificate-less PKI
certificate revocation list
biblio
Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT
Submitted by grigby1 on Tue, 03/07/2017 - 12:41pm
ExFAT
pubcrawl170109
process monitoring
media mirror
legal effect
lawsuit
Law
judicial identification
hash authentication
Forensics
File systems
file location algorithm
file locating
file character code algorithm
file character code
ExFAT file system
Algorithm design and analysis
evidence recovery
electronic data recovery forensics
electronic data
document fragment reassembly algorithm
document fragment
Distributed Bragg reflectors
digital signatures
digital multisignature
Digital Forensics
destroyed situation
data recovery
Data models
Cryptography
Computer crime
Classification algorithms
biblio
Physically Unclonable Digital ID
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
physically unclonable function
Hash functions
identification of persons
identity management systems
Immune system
mobile hardware security
Optical imaging
Optical sensors
physically unclonable digital ID
encryption keys
pubcrawl170109
PUF
Q-PUDID
quasi-PUDID
random number generation
Servers
two-factor authentication
Access Control
dynamic human identity
digital signatures
digital identity thefts
device authentication
descrambler-hardware authentication
cyber security
Cryptography
cryptanalysis
computer security
Cloning
clonable static information
center for strategic and international studies
biometrics
authorisation
authentication
biblio
"Ctracer: Uncover C amp;amp;C in Advanced Persistent Threats Based on Scalable Framework for Enterprise Log Data"
Submitted by abfox on Tue, 02/14/2017 - 11:05am
scalable framework
internet
invasive software
Itemsets
malware
MapReduce
network signature
networking logs
pubcrawl170101
hackers
Security Operations Center
Servers
SoC
stealthy activities detection
stealthy command and control channel detection
targeted attacks
traffic data
Computer crime
Advanced Persistent Threat (APT)
APT attack
business data processing
C&C channel
C&C sessions
C)
Command and Control (C&
command and control systems
advanced persistent threat
Computers
Ctracer
Digital Forensics
digital signatures
Electronic mail
enterprise log data
forensic report
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »