Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
A novel security mechanism using hybrid cryptography algorithms
Submitted by grigby1 on Wed, 01/10/2018 - 11:27am
AES
Algorithm design and analysis
Compositionality
encryption
hash algorithms
Hybrid Cryptography
MD5
Protocols
pubcrawl
Public key
Receivers
Resiliency
RSA
security
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
Radio frequency
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
matrix algebra
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
Algorithm design and analysis
key generation process
Human Factors
Human behavior
Galois fields
finite field
Ergodic Matrix
EPC code
encryption process
encryption
Databases
counterfeit
BMQE system
BMQ polynomials
bisectional multivariate quadratic equation system
anticounterfeit scheme
biblio
TLS Connection Validation by Web Browsers: Why do Web Browsers Still Not Agree?
Submitted by K_Hooper on Wed, 12/20/2017 - 10:33am
security of data
X.509 certificates
X.509 Certificate
Web users
Web servers
Web browser validation process
Web Browser Security
Web browsers
Web browser behaviour
TLS connection validation
standards
Browsers
Resiliency
Public key
pubcrawl
Protocols
online front-ends
Metrics
IP networks
Human behavior
Certificate Validation
biblio
Improving the security of internet of things using encryption algorithms
Submitted by grigby1 on Tue, 12/12/2017 - 12:30pm
Metrics
Software algorithms
smart devices
Security of internet of things
safety risks
Resiliency
Receivers
Radio frequency identification (RFID)
Public key
pubcrawl
privacy
advanced information technology
IoT security
Internet of Things
hybrid encryption algorithm
Hybrid algorithm
Human Factors
Human behavior
encryption
digital signatures
Cryptography
composability
biblio
Blockchain-Assisted Information Distribution for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Access Control
authentication
composability
Compositionality
contracts
Human behavior
Human Factors
Identity management
internet
Metrics
Provenance
provenance verification
pubcrawl
Public key
Resiliency
sensors
biblio
Merkle-Hellman knapsack-side channel monitoring based secure scheme for detecting provenance forgery and selfish nodes in wireless sensor networks
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Metrics
Watchdog
side channel monitoring
Selfish nodes
Resiliency
Public key
pubcrawl
Provenance forgery
Provenance
Monitoring
Bloom filter
Merkle-Hellman knapsack algorithm
Human Factors
Human behavior
encryption
encoding
Compositionality
composability
Ciphers
biblio
Analysis of asymmetric encryption scheme, AA \#x03B2; Performance on Arm Microcontroller
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Internet of Things
system-on-chip
system on chip
sensors
security protection
security
Scalability
Resiliency
random-access storage
Random access memory
public key cryptography
Public key
pubcrawl
microcontrollers
Metrics
Libraries
AA-Beta
Instruction cache
GNU multiple precision arithmetic library package
encryption
embedded microcontroller
Elliptic curve cryptography
digital arithmetic
Data Cache
Clocks
cache storage
asymmetric encryption scheme
Asymmetric
arm microcontroller
ARM Cortex-M7 microcontroller
AAβ
biblio
Mutual Authentication Protocol for RFID Based on ECC
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Public key
tracking attacks
telecommunication security
system internal attack
Servers
security scalability
security protocol
Scalability
RFID systems
Resists
Resiliency
radiofrequency identification
radio frequency identification
authentication
pubcrawl
Protocols
mutual authentication protocol
mutual authentication
Metrics
Internet of things security and privacy
forward security
Elliptic curve cryptography
ECC
Denial of Service attacks
Cryptographic Protocols
camouflage attacks
biblio
Security and privacy for smart grid using scalable key management
Submitted by grigby1 on Fri, 11/03/2017 - 10:31am
Public key
symmetric key technique
symmetric key scheme works
smart power grids
Smart Grids
Smart Grid
sensors
secure key management
Scalable Security
scalable key management
Scalability
replay attack
public key cryptography
authentication
pubcrawl
Protocols
power system security
power system management
Needham-Schroeder authentication protocol
Needham Schroder Authentication
man-in-the-middle attack
key management
Fault-Tolerance
fault tolerance
elliptic curve public key technique
Cryptographic Protocols
biblio
Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
pubcrawl
financial data processing
financial infrastructure
Human behavior
Metrics
Online banking
online fora
privacy
Protocols
erratic cybercrime landscape
Public key
ransom payments
Ransomware
reddit
Resiliency
security
sheep marketplace scam
threat intelligence
Cryptography
bitcoin
Bitcoin ecosystem
Bitcoin Fog
Bitcoin services
BitcoinTalk
BTC-e
composability
Computer crime
auxiliary information
CryptoLocker
CryptoLocker economy
CryptoLocker operation
Cryptolocker ransoms
Cybercrime
cybercrimes
decentralized cryptographic currency
Electronic mail
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »