Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AES
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
Encryption Based On Multilevel Security for Relational Database EBMSR
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Ciphers
Relational Database
multisecurity level
multilevel security model
Multi level
MLS
encryption algorithm
DBMS
cryptosystem
Bell LaPadula
RC4
AES
DES
relational database security
Cryptography
information technology
relational databases
internet
Databases
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
decryption
encryption
biblio
Improve the security over the wireless sensor networks in medical sector
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
Ciphers
WSN
RC4 algorithms
RC4
medical sector
hospital
data transfer integrity
data transfer confidentiality
data transfer availability
body sensor networks
AES algorithms
AES
Biomedical monitoring
hospitals
Monitoring
sensor security
secure protocol
internet
Metrics
component
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Heterogenic Multi-Core System on Chip for Virtual Based Security
Submitted by aekwall on Mon, 02/10/2020 - 11:58am
multiprocessing systems
multicore computing security
virtual-based security
the GOST
standard symmetric key block cipher
neuromatrix
neural network emulation
heterogenic multicore system on chip
heterogenic multi-core system-on-chip
GOST
coding information
Cipher
virtual reality
AES
signal processing
DES
Scalability
Image Processing
assembly language
Computers
microsoft windows
Decoding
neural nets
standards
Metrics
pubcrawl
Resiliency
Kernel
system-on-chip
Hardware
encryption
Cryptography
biblio
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
side channel analysis attacks
narrow bandpass filtering
optimal leakage models
parallel round-based datapath
PRINCE
pubcrawl
Resiliency
resource constraints
round unrolled implementations
round unrolling
Scalability
side channel analysis
multiband narrow bandpass filtering techniques
side channel signatures
side-channel leakage
signal isolation
Signal to noise ratio
signal-to-noise ratio
SIMON
SIMON datapaths
size 45.0 nm
SNR
time domain correlation power analysis
Energy Efficiency
AES
AES algorithm
Band-pass filters
Ciphers
combinational logics
Correlation
correlation frequency analysis
Cryptography
edge nodes
encryption
advanced encryption standard
field programmable gate arrays
Filtering
first-order side-channel leakages
FPGA
fully-unrolled datapath
Hardware
improved CFA attack
leakage models
Lightweight Ciphers
lightweight cryptographic algorithms
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
biblio
Hardening AES Hardware Implementations Against Fault and Error Inject Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:18am
coding theory
security
AES
error correction
error detection
Human Factors
Metrics
non-linearity
pubcrawl
robust codes
Scalability
Tamper resistance
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks
biblio
Intrusion detection systems in MANETs using hybrid techniques
Submitted by grigby1 on Wed, 06/20/2018 - 12:23pm
RSA algorithm
mobile ad hoc networks
pubcrawl
public key cryptography
resilience
Resiliency
Routing
Routing protocols
RSA
Metrics
security
security of data
self organized wireless technologies
SHA 256 hashing technique
telecommunication security
ZRP
ZRP routing protocol
AES
MANET
intrusion detection system technique
Intrusion Detection
IDS technique
hybrid cryptographic technique
enhanced adaptive acknowledgement
EAACK
data authentication
Cryptography
Cryptographic Protocols
Compositionality
base station
AODV routing protocol
AODV
AES algorithm
biblio
A New Hybrid Symmetric-Key Technique to Enhance Data Security of Textual Information Using Random Number Generator
Submitted by grigby1 on Thu, 05/24/2018 - 12:15pm
AES
Conferences
Fiestel
Human behavior
Metrics
multilevel security
pubcrawl
Random generators
random key generation
resilience
Resiliency
RSA
Scalability
textual information
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »