Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Signature Based Intrusion Detection for Zero-Day Attacks: (Not) A Closed Chapter?
Submitted by BrandonB on Wed, 05/06/2015 - 1:58pm
Ports (Computers)
zero day detection
Zero day attacks
testing
Software
SNIDS
signature based network intrusion detection
Servers
Reliability
Code injection
Payloads
NIDS
false alarm
exploits
digital signatures
computer security
computer network security
computer architecture
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 10:47am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
Group signature entanglement in e-voting system
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
group signature entanglement
security system
security of data
replay attack
Receivers
Qubit
Quantum entanglement
quantum computing
Protocols
politics
man-in-the-middle attack
authentication
Entanglement
entangled state
electronic voting
eavesdropping
e-voting system
digital signatures
database
cheating purposes
ballots
biblio
Application of NTRU Cryptographic Algorithm for SCADA Security
Submitted by BrandonB on Wed, 05/06/2015 - 10:09am
SCADA communication protocols over TCP/IP
power lines
process control
process monitoring
production engineering computing
programmable controllers
public key cryptography
real-time critical infrastructure system
SCADA architecture
SCADA communication protocols
NTRU public key algorithm
SCADA security standards
SCADA systems
security threats-attacks
supervisory control and data acquisition system
TCP/IP
transport protocols
Transportation
water
end-to-end security
authentication
Communication Systems
critical infrastructure system
critical infrastructures
Cryptographic Protocols
digital signatures
DNP3
encryption
AGA-12
IEC 60870
IEC 61850
IEC 62351
IEC standards
industrial process control
industrial process monitoring
Modbus
NTRU cryptographic algorithm
biblio
Privacy protection in cloud using identity based group signature
Submitted by BrandonB on Wed, 05/06/2015 - 10:08am
Elliptic curve cryptography
user authentication
security problems
secure anonymous authentication method
privacy protection
privacy problems
privacy
identity based group signature
identity based cryptosystem
group signature
authentication
digital signatures
data privacy
Cryptography
cloud services
Cloud Security
Cloud Computing
cloud
authorisation
biblio
SkyTracer: Towards fine-grained identification for Skype traffic via sequence signatures
Submitted by BrandonB on Wed, 05/06/2015 - 10:08am
ISP
VoIP service
unique sequence signatures
transport protocols
telecommunication traffic
SkyTracer
Skype UDP flow
Skype
Sequence Signature
Protocols
Payloads
optimisation
network performance optimization
Accuracy
IP networks
Internet telephony
internet
information security
host level identification
Flow-level Identification
fine grained Skype traffic identification accuracy
Educational institutions
digital signatures
Correlation-based Approach
computer network performance evaluation
Complexity theory
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Wed, 05/06/2015 - 10:07am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
Efficient modular multiplication algorithms for public key cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:07am
modular exponentiation
word length
substitute and reward algorithms
store and forward algorithms
RSA
public key cryptosystems
Public key cryptography(PKC)
public key cryptography
modular multiplication algorithms
Modular Multiplication
Algorithm design and analysis
encryption
digital signatures
digital signature schemes
cryptographic transformations
Conferences
Ciphers
bit forwarding algorithms
binary exponentiation
BFW algorithms
biblio
A decentralized approach for security and privacy challenges in the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 10:06am
Information Leakage
wireless technologies
user privacy
sensitive data management
security challenges
security
public key cryptography
privacy
personal area networks
lightweight token
IoT stakeholders
IoT deployment
Internet of Things
internet
6LoWPAN
elliptic curve digital signature algorithm
ECDSA
distributed capability-based access control mechanism
distributed access control
digital signatures
data privacy
Cryptography
cryptographic primitives
computer network security
CoAP resources
authorization
authorisation
authentication
biblio
An architectural framework for encryption amp; generation of digital signature using DNA cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:05am
DNA computing DNA cryptography
Steganography
plaintext size
key size
information security
encryption time
encryption algorithms
encryption
encoding
DNA digital coding
DNA cryptography
architectural framework
DNA computing
DNA
digital signatures
digital signature generation
digital signature encryption
decryption time
cryptanalysis
Ciphers
biocomputing
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
next ›
last »