Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Efficient Group Data Sharing In Cloud Environment Using Honey Encryption
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
group data sharing
Secure File Sharing
resilience
Resiliency
pubcrawl
standards
security
resource sharing
information sharing
honey encryption
Group Manager
Ciphers
efficiency
cloud environment
advanced encryption standard
cloud
resource allocation
Servers
Cloud Computing
encryption
Cryptography
biblio
Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
Block Cipher
Scalable Security
Weak keys
Ultra Gridsec
stream cipher algorithm
stream cipher
scalable symmetric key cryptographic scheme
peer-to-peer desktop grid framework
multithreading
grid computing security
cryptography security
block cipher encryption algorithm
Cryptography
security scheme
Instruction sets
Ciphers
security attributes
grid computing
Scalability
Throughput
performance evaluation
Peer-to-peer computing
pubcrawl
encryption
biblio
Methods and Special Processors of Entropy Signal Processing
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
entropy-manipulated signals
Time
theoretical cryptography
theoretical comments
special processors
signal processing
pubcrawl
Program processors
probability
Probabilistic logic
probabilistic entropy
Hardware
estimation
a special processor
entropy signal processing
Entropy
Cryptography
correlation activity
Correlation
Compositionality
composability
Ciphers
cipher signals
cipher signal receivers
and structural complexity
biblio
Hybrid Method to Implement a Parallel Search of the Cryptosystem Keys
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
parallel search
GA environments
Generators
genetic algorithms
interconnected sequence parts
Interconnected sequences
LFSR
Mathematical model
parallel processing
GA
parallelism
pubcrawl
sequences recognition mechanism
successive cipher characters
theoretical cryptography
theoretical principles
three-level contributions
basic encryption key
final key sequence mechanism
DNA strands
DNA computing
DNA
cryptosystem keys
Cryptography
cryptanalysis
counter value
Compositionality
composability
Ciphers
character files
biocomputing
binary sequences
binary equations system
biblio
Side-Channel Analysis for Searchable Encryption System and Its Security Evaluation
Submitted by grigby1 on Mon, 03/02/2020 - 12:33pm
Indexes
Tamper resistance
side-channel analysis
side channel attack
Security Evaluation
searchable encryption system
Scalability
pubcrawl
Power demand
power analysis
Metrics
Medical services
medical computing
searchable encryption
Immune system
illegal attacks
Human Factors
Human behavior
Hamming distance
encryption
embedded searchable encryption
Cryptography
Ciphers
Big Data
Artificial Intelligence
biblio
White-Box Cryptography Based Data Encryption-Decryption Scheme for IoT Environment
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
IoT environment
white-box cryptography based data encryption-decryption scheme
white-box cryptography
White Box Security
white box cryptography
transportation monitoring
symmetric encryptions algorithms
resource constrained environments
Resiliency
resilience
pubcrawl
pedestrian levels
Metrics
medical devices
Matrix decomposition
manufacturing process
advanced encryption standard
IoT devices
Internet of Things
infusion pumps
implanted devices
encryption
encoding
differential attacks
Cryptography
computer network security
composability
code lifting attacks
Ciphers
cipher block chaining mode
CBC mode.
Block Cipher
biblio
Improve the security over the wireless sensor networks in medical sector
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
Ciphers
WSN
RC4 algorithms
RC4
medical sector
hospital
data transfer integrity
data transfer confidentiality
data transfer availability
body sensor networks
AES algorithms
AES
Biomedical monitoring
hospitals
Monitoring
sensor security
secure protocol
internet
Metrics
component
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application
Submitted by aekwall on Mon, 02/10/2020 - 10:44am
piccolo encryption algorithm
4 input LUTs
64 bits block size
area optimization
ASIC
constrained RFID application
different design strategies
efficient hardware architecture
Fiestel structure
hardware design
hardware metrics
low resource applications
optimized area
Piccolo Algorithm
128 bits
piccolo lightweight algorithm
radiofrequency identification
relevant lightweight block ciphers
severe security concerns
supports high speed
Throughput.
tremendous pace
ultra-lightweight applications
variable key size
word length 64.0 bit
word length 80.0 bit
Xillinx
Microelectronics Security
security applications
field programmable gate arrays
FPGA
Cryptography
encryption
Internet of Things
telecommunication security
Hardware
Table lookup
IoT applications
smart devices
Resiliency
pubcrawl
composability
IoT
RFID
Throughput
Ciphers
security issues
Predictive Metrics
private information
word length 128.0 bit
Hardware Implementation
hardware resources
lightweight cryptographic algorithms
S-box
lightweight cryptography
biblio
Cipher Modification Against Steganalysis Based on NIST Tests
Submitted by grigby1 on Mon, 02/10/2020 - 10:42am
Image edge detection
testing
steganography detection
Steganography
steganalytic method
pubcrawl
privacy
NIST tests steganalysis
NIST
Metrics
Image Steganography
arithmetic codes
Image coding
encryption
encoding
edge detection
Cryptography
composability
Ciphers
cipher modification
arithmetic source compression coding
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 11:01am
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »