Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Using Software-Defined Networking for Ransomware Mitigation: The Case of CryptoWall
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
OpenFlow
user data encryption
surveillance
software defined networking
Servers
SDN-based system design
Resiliency
real-time mitigation method
ransomware mitigation
Ransomware
Public key
pubcrawl
composability
network security
Metrics
malware
IP networks
internet
Human behavior
Forensics
encryption
CryptoWall case
Cryptography
computer network security
biblio
Redesigning QR Code Ecosystem with Improved Mobile Security
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
mobile marketing
Software
security threat
security risks
risk analysis
redesigned QR code ecosystem
QR codes
QR code
public key infrastructure
Public key
pubcrawl170112
Mobile Security
advertising
mobile computing
life cycle
information system
Ecosystems
Ecosystem
digital signatures
digital signature mechanism
digital signature
Decoding
authentication
advertising campaigns
biblio
Secure Public Key Regime (SPKR) in vehicular networks
Submitted by grigby1 on Tue, 03/07/2017 - 12:42pm
lower authentication delay
vehicular networks
vehicles
secure public key regime
Schnorr signature
road side units
public key cryptography
Public key
pubcrawl170109
preauthentication mechanism
mobile radio
authentication
digital signatures
Denial of Service attacks
denial of service attack
delegated trusted authorities
Computer crime
complex certificate verification process
Collusion Attacks
collusion attack
certificate-less PKI
certificate revocation list
biblio
"Multiple embedding secret key image steganography using LSB substitution and Arnold Transform"
Submitted by grigby1 on Tue, 02/14/2017 - 12:13pm
pubcrawl170102
visualization
Transforms
Steganography
Spatial domain
security of data
secret key image steganography
secret image encryption
Public key
Arnold transform
LSB substitution
Image coding
Histograms
digital images
Digital Image Steganography
Data Security
Cryptography
covert channel
biblio
"Secured data communication system using RSA with mersenne primes and Steganography"
Submitted by grigby1 on Tue, 02/14/2017 - 11:59am
image file
Steganography
secured data communication system
RSA cipher
public key cryptography
Public key
pubcrawl170102
Prime RSA
Mersenne primes
Mersenne
arrays
Image color analysis
Image coding
hidden text
factorization
encryption
data communication
Cryptography
communication channel
Ciphers
biblio
"HRJ_encryption: An ASCII code based encryption algorithm and its implementation"
Submitted by grigby1 on Tue, 02/14/2017 - 11:10am
information technology
Secret key
Receivers
public key cryptography
Public key
pubcrawl170102
private key cryptography
private key
Plain Text
personal desktop
Algorithm design and analysis
HRJ_encryption
encryption
decryption
Cloud Computing
cipher text
ASCII code based encryption algorithm
ASCII Code
arrays
biblio
AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments
Submitted by Anonymous on Mon, 12/07/2015 - 3:40pm
mobile ad hoc networks
telecommunication traffic
telecommunication security
secret verification message routing
Routing protocols
Routing
Public key
onion routing
mobile nodes
mobile computing
Mobile ad hoc networks (MANETs)
AASR protocol
MANET
key-encrypted onion routing
fake routing packets
denial-of-service broadcasting
Cryptographic Protocols
authenticated routing
authenticated anonymous secure routing protocols
anonymous routing
adversarial environments
Ad hoc networks
biblio
Verification of DNSsec Delegation Signatures
Submitted by BrandonB on Wed, 05/06/2015 - 1:43pm
interactive theorem prover
Theorem Proving
Servers
security protocol verification
Public key
Protocols
model checking analysis
Isabelle/HOL
Isabelle-HOL
IP networks
internet
authentication
inference mechanisms
inductive approach
formal verification
DNSsec protocol
DNSsec delegation signatures
DNSsec
delegation signatures
Cryptographic Protocols
chain of trust
biblio
Enhancing security in cyber-physical systems through cryptographic and steganographic techniques
Submitted by BrandonB on Wed, 05/06/2015 - 1:08pm
information technology
Steganography
steganographic technique
security enhancement
Receivers
Public key
Pragmatics
physical elements
multi-agent systems
authorisation
hierarchical access
encryption
Data Security
data confidentiality
cyber-physical systems
Cryptography
cryptographic technique
computational elements
biblio
A self-organized key management scheme for ad hoc networks based on identity-based cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 12:47pm
Ad hoc networks
authentication
Cryptography
identity based cryptography
informal analysis
key management
mobile ad hoc networks
Proposals
Public key
security
self-organization
self-organized key management
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »