Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
Developing Root Problem Aims to Create a Secure Digital Signature Scheme in Data Transfer
Submitted by aekwall on Mon, 02/08/2021 - 12:44pm
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
information technology
digital signature
electronic data interchange
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
data transfer
biblio
A Comparative Survey on Blockchain Based Self Sovereign Identity System
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
Medical services
smart contracts
self sovereign identity
Scalability
Resiliency
resilience
Public key
pubcrawl
privacy
Identity management
internet
Human Factors
Human behavior
honey pots
Honey Pot
Cryptography
blockchain
biblio
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI
Submitted by aekwall on Mon, 02/01/2021 - 10:40am
Public key
digital trust
ethereum
Ethereum blockchain
human interaction
human trust
Internet of Things
PKI model
Protocols
pubcrawl
digital certificates
public key cryptography
public key infrastructure
Public Key Infrastructure model
Servers
trust
trust concerns
trust enhancement
trusted Certificate Authority
automation issue
Resiliency
Scalability
Human behavior
Metrics
ACME
ACME protocol
authorisation
Automated Certificate Management Environment
PKI Trust Models
blockchain
blockchain technology
certificate authority
certificate issuance automation protocol
certification
contracts
conventional security models
current trust issues
biblio
Anon-ISAC: Anonymity-preserving cyber threat information sharing platform based on permissioned Blockchain
Submitted by grigby1 on Thu, 01/28/2021 - 1:02pm
anonymity
blockchain
composability
computer security
Cybersecurity
Electrical Engineering
Human behavior
information management
IoT
Metrics
Organizations
privacy
pubcrawl
Public key
resilience
Resiliency
biblio
Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line
Submitted by aekwall on Mon, 01/25/2021 - 11:59am
password
High-speed
corporate network
Asymmetric Encryption
elliptic curve
Ciphers
PLC
Elliptic curves
Public key
Servers
Metrics
Cryptography
composability
pubcrawl
Human behavior
Resiliency
Protocols
encryption
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 11:57am
image colour analysis
text-to-image encryption algorithms
Text-to-Image Encryption
survey
RSA and AES
RGB Value
RGB color value
keeping data
global network
data encryption techniques
Comparison
Asymmetric Encryption
symmetric encryption algorithms
asymmetric encryption algorithms
sensitive data
Cryptography
Software algorithms
public key cryptography
Public key
Image color analysis
text analysis
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
Receivers
encryption
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
different ECUs
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
improved security
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
Metrics
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
road safety
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
biblio
DeepRing: Protecting Deep Neural Network With Blockchain
Submitted by grigby1 on Tue, 12/01/2020 - 1:00pm
DeepRing
technical perspectives
Public key
pubcrawl
optimizers
object detection
neural nets
machine learning
learning (artificial intelligence)
learned parameters
human trust
human intervention
Human behavior
face recognition
appropriate loss functions
Deep Neural Network
deep learning based architectures
decryption algorithms
cybersecurity industry
Cryptography
cryptographic hash
computer vision applications
computer vision
computer architecture
commercial perspectives
centralized authority
blockchain
authorisation
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »