Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Identity of Things (IDoT): A Preliminary Report on Identity Management Solutions for IoT Devices
Submitted by grigby1 on Thu, 08/17/2023 - 3:40pm
resource management
Identity of Things (IDoT)
Identity Management (IdM)
IAM
digital certificates
device identity
Device Certificates
Block Chain
Fog computing
Internet of Things (IoT)
IoT security
Public key
Internet of Things
edge computing
Companies
Computer crime
PKI
Identity management
Scalability
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 10:32am
Cloud Computing
Servers
pubcrawl
Human behavior
Human Factors
Metrics
resilience
Resiliency
Scalability
data privacy
Reliability
Public key
Privacy-preserving
Homomorphic encryption
Knowledge Discovery
biblio
A Study on a DDH-Based Keyed Homomorphic Encryption Suitable to Machine Learning in the Cloud
Submitted by grigby1 on Fri, 08/11/2023 - 10:30am
keyed homomorphic public key encryption
Homomorphic encryption
Consumer electronics
Public key
Scalability
Resiliency
resilience
Metrics
Human Factors
Human behavior
pubcrawl
machine learning
biblio
Profiled Side-Channel Attack on Cryptosystems Based on the Binary Syndrome Decoding Problem
Submitted by grigby1 on Thu, 08/03/2023 - 12:57pm
encryption
pubcrawl
Metrics
resilience
Resiliency
NIST
composability
side-channel attacks
Decoding
Public key
Side-channel attack
Post-quantum cryptography
semiconductor lasers
Encapsulation
syndrome decoding problem
Forward Error Encryption
biblio
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
Submitted by grigby1 on Thu, 08/03/2023 - 12:56pm
encryption
pubcrawl
Metrics
resilience
Resiliency
Cryptography
Computational modeling
composability
Public key
Random variables
Noise measurement
black-box reductions
bounded leakage
dense leakage
leakage-resilient cryptography
Forward Error Encryption
biblio
Digital Signature Performance of a New Quantum Safe Multivariate Polynomial Public Key Algorithm
Submitted by grigby1 on Tue, 07/18/2023 - 2:23pm
Resiliency
public-key cryptography
PQC Performance
Multivariate Polynomials
Multivariate Polynomial Signature Schemes
DS
digital signature schemes
Authentication Algorithms
PQC
exponentiation
Human Factors
pubcrawl
Communication Systems
Post-quantum cryptography
Public key
Portable computers
Java
Benchmark testing
NIST
Industries
Scalability
resilience
biblio
Design of IsoQER Cryptosystem using IPDLP
Submitted by grigby1 on Tue, 07/18/2023 - 2:22pm
Market research
IsoQuadratic Exponentiation Randomized
IsoPartial Discrete Logarithm Problem
Isomathematics
exponentiation
Human Factors
Resiliency
Security analysis
Cyberspace
security
Public key
Complexity theory
Bandwidth
Scalability
Safety
resilience
pubcrawl
biblio
An Efficient Medical Image Encryption Using Magic Square and PSO
Submitted by grigby1 on Thu, 07/13/2023 - 11:46am
Sociology
Optimized Image Encryption
optimization algorithm
Logistic Chaotic Map
Image Encryption and Decryption
communication security
Magic Square
correlation coefficient
efficient encryption
Phase measurement
encryption
Public key
chaotic communication
composability
Entropy
Cryptography
Resiliency
resilience
pubcrawl
biblio
Application to manage digital certificates as a Certificate Authority (CA) according to the Digital Signature Law of El Salvador
Submitted by grigby1 on Thu, 06/29/2023 - 11:01am
Cryptography
encryption
non-repudiation
pubcrawl
resilience
Resiliency
Software
Scalability
digital signature
standards
Proposals
Public key
digital signatures
certificate authority
Digital certificate
elliptic curves.
biblio
A Quantum-Resistant Face Template Protection Scheme using Kyber and Saber Public Key Encryption Algorithms
Submitted by grigby1 on Fri, 03/31/2023 - 10:24am
NIST
standardization
Saber
Resiliency
resilience
quantum computing
Public key
privacy
PostQuantum Cryptography
biometric encryption
Metrics
Lattices
Kyber
Homomorphic encryption
face recognition
biometric template protection
pubcrawl
1
2
3
4
5
6
7
8
9
…
next ›
last »