Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AES
biblio
Securing SCADA Applications Using OpenPLC With End-To-End Encryption
Submitted by grigby1 on Wed, 05/09/2018 - 2:49pm
AES
Compositionality
encryption
Human behavior
Modbus
OpenPLC
PLC
pubcrawl
resilience
Resiliency
SCADA
SCADA systems
security
biblio
An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs
Submitted by grigby1 on Tue, 05/01/2018 - 11:22am
AES
FPGAs
hardware acceleration
IP cores
OpenSSL
biblio
An Implementation and Experimental Evaluation of Hardware Accelerated Ciphers in All-Programmable SoCs
Submitted by grigby1 on Mon, 04/30/2018 - 3:08pm
AES
FPGAs
hardware acceleration
IP cores
Metrics
OpenSSL
pubcrawl
Security Metrics
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
biblio
Complexity of Cyber Security Architecture for IoT Healthcare Industry: A Comparative Study
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
Scalability
patient personal information
patient wellness information
personal health
privacy
pubcrawl
Read only memory
resilience
Resiliency
Medical services
security of data
Wearable devices
wearable IoT healthcare applications
wearables security
XC7Z030 - 3fbg676 FPGA device
Xilinx IP cores
Xilinx Zynq-7000
Healthcare
Algorithm design and analysis
Complexity theory
Cyber Attacks
cyber security architecture
Cyber-security
encryption
field programmable gate arrays
health care
AES
Human behavior
Internet of Things
IoT
IoT based healthcare devices
IoT healthcare industry
IP networks
medical information systems
biblio
Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
DSA
Three-dimensional displays
standards
Resiliency
resilience
Public key
pubcrawl
private and public key encryption
Metrics
Human behavior
encryption
elliptic curve
3DES
Diffie-Hellman and RSA
DES
decryption
Cryptography
Compositionality
Cloud Computing
Classification algorithms
Ciphers
Blowfish
Asymmetric Encryption
AES
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
biblio
SecTrans: Enhacing user privacy on Android Platform
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
resilience
Metrics
MIT
mobile computing
mobile phone
PDA
personal digital assistant
privacy
pubcrawl
Humanoid robots
Resiliency
RSA
Scalability
SecTrans
smart phones
textual data transmission
Triple DES
user data privacy
cellular radio
android
Android (operating system)
android encryption
Android mobile application
Android operating system
Androids
Blowfish
cell phone
AES
Cryptography
data privacy
decryption
encrypted format
encryption
Google
Human behavior
Human Factors
biblio
Side-channel collision attack based on multiple-bits
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
AES
Algorithm design and analysis
collision attack
composability
encryption
Euclidean distance
field programmable gate arrays
Hardware
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
Side-channel attack
side-channel attacks
biblio
Multicore implementation of EME2 AES disk encryption algorithm using OpenMP
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
multicore computing security
standards
Speed up
Software algorithms
Scalability
Resiliency
resilience
pubcrawl
Organizations
multiprocessing systems
Multicore processing
multicore implementation
AES
Multicore Computing
multicore compatible parallel implementation
Metrics
full disk encryption
encryption
Encrypt Mix Encrypt V2 Advanced Encryption Standard
EME2 AES disk encryption algorithm
EME2 AES
Cryptography
computational complexity
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »