Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Research and design of cryptography cloud framework
Submitted by aekwall on Mon, 08/05/2019 - 10:37am
cryptography resources
Virtualization
Resiliency
pubcrawl
Hardware
expandability
encryption
cryptography technology
cryptography services
cryptography service demand
Ciphers
cryptography cloud framework
cryptography cloud
Cryptography
composability
cloud environment
cloud cryptography service
cloud cryptography machine
cloud computing mode
Cloud Computing
biblio
A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Submitted by grigby1 on Mon, 05/20/2019 - 4:29pm
information theoretic security
triangular game
security evaluator
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
Mathematical model
information theory
Ciphers
Human Factors
Human behavior
Games
game theory
Entropy
cryptosystem security
cryptosystem
Cryptography
composability
collaboration
biblio
An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based Cryptography
Submitted by grigby1 on Thu, 02/14/2019 - 11:13am
Ciphers
composability
Compositionality
computer security
decryption
DNA
DNA cryptography
encoding
encryption
Enhanced polyalphabetic Cipher algorithm
pubcrawl
theoretical cryptography
Vigenere cipher
biblio
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
exponential strong converse theorem
theoretical cryptography
Zinc
source coding
signal estimation
side channel-attacks
Shannon cipher system
secrecy bounds
Random variables
one helper source coding problem
information theory
information theoretical analysis
privacy
distributed sensors
Communication channels
bounded storage eavesdropper
Ciphers
side-channel attacks
Decoding
Compositionality
Cryptography
telecommunication security
composability
pubcrawl
biblio
Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
AEGIS-128
theoretical cryptography
vanilla RMFA
theoretical round modification fault analysis
theoretical level
Round modification
Fault attack
Ciphers
authenticated encryption
algebraic techniques
Algebraic Fault Analysis
AEGIS-256
authentication
AEGIS
advanced round modification fault analysis
advanced fault analysis
Compositionality
Circuit faults
Cryptography
encryption
Ad hoc networks
composability
pubcrawl
biblio
Cryptosystem Security Evaluation Based on Diagonal Game and Information Theory
Submitted by grigby1 on Fri, 10/26/2018 - 5:04pm
Games
wireless communications networks
telecommunication security
Security Evaluation
Scalability
Random variables
pubcrawl
Metrics
information theory
Human Factors
Ciphers
game theory
game theoretic security
Entropy
diagonal Game
cryptosystem security evaluation
Cryptography
cognitive radio networks
cognitive radio
biblio
A SDN security control forwarding mechanism based on cipher identification
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
network management
user nonrepudiation
software defined networking
Servers
security control forwarding
SDN network security control forwarding mechanism
SDN
Resiliency
resilience
Repudiation
pubcrawl
programmability
packet authenticity
Object recognition
network services
authentication
network architecture
Metrics
human factor
Human behavior
forwarding device
flow table matching
Databases
Cryptography
control capabilities
computer network security
computer network management
composability
Ciphers
cipher identification
biblio
Implementation of SERPENT cryptographic algorithm for secured data transmission
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
key management
Technological innovation
symmetric key
substitution permutation network
SERPENT cryptographic algorithm
SERPENT
secured data transmission
s-box stage
round function
Resiliency
resilience
Repudiation
pubcrawl
Metrics
linear mixing stage
key scheduling
Algorithm design and analysis
IP networks
human factor
Human behavior
graphical programming tool
encryption
enciphering process
decryption
deciphering process
Data Security
data integrity
Cryptography
composability
Ciphers
Blockcipher
biblio
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
privacy
wireless LAN
Web servers
wearables security
wearables
wearable computers
smart phones
security
secure Internet communication
secure communication protocols
Scalability
Resiliency
resilience
pubcrawl
Protocols
available wearable computing devices
network measurements
Internet servers
internet
Human behavior
energy consumption
direct secure communication
direct Internet connection
direct Internet communication
direct communication
Cryptography
computer network security
Ciphers
Bluetooth
biblio
Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
DSA
Three-dimensional displays
standards
Resiliency
resilience
Public key
pubcrawl
private and public key encryption
Metrics
Human behavior
encryption
elliptic curve
3DES
Diffie-Hellman and RSA
DES
decryption
Cryptography
Compositionality
Cloud Computing
Classification algorithms
Ciphers
Blowfish
Asymmetric Encryption
AES
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »