Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Secured and Reliable File Sharing System with De-Duplication Using Erasure Correction Code
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Reliability
file-level deduplication system
file sharing system
File systems
Human behavior
Metrics
optimized storage
Peer-to-peer computing
pubcrawl
Reed Solomon Code
error correction codes
resilience
Resiliency
RSA encryption
Secure File Sharing
Secure storage
Servers
storage management
storage space
video files
Cryptography
authorized storage
Ciphers
cipher texts
Cloud Computing
cloud providers
cloud service subscriber
cloud storage servers
composability
computer network reliability
AES encryption
data deduplication technique
data encryption
data owners
de-duplication
encrypted file reliability
encrypted files
encryption
erasure correcting code
erasure correction code
biblio
Enhanced Operating System Protection to Support Digital Forensic Investigations
Submitted by grigby1 on Mon, 03/05/2018 - 12:06pm
operating systems (computers)
forensic-friendly OS design
Forensics
fully homomorphic encryption
Metrics
obfuscation
operating system extensions
operating system protection
operating systems
Forensic software
OS tamper-resistance
pubcrawl
resilience
Resiliency
security
system data recovery
White Box Encryption
white-box cryptography
Cryptography
CEF
Ciphers
component encryption
composability
computer systems
computing on encrypted data
computing with encrypted functions
criminal activity footprints
CED
data integrity
data provenance
data veracity
digital forensic investigations
Digital Forensics
encryption
evidence collection
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
biblio
Research of a reconfigurable coarse-grained cryptographic processing unit based on different operation similar structure
Submitted by grigby1 on Wed, 02/21/2018 - 12:45pm
pubcrawl
logic synthesis
M/DLFSR
Metrics
multiply/divide linear feedback shift register
Policy
Policy-Governed Secure Collaboration
power aware computing
power consumption saving
logic design
Reconfigurable
reconfigurable architectures
reconfigurable coarse-grained cryptographic processing unit
resilience
Resiliency
Scalability
shift registers
size 55.0 nm
Different Operations Similar Structure
Algorithm design and analysis
arrays
Ciphers
coarse-grained reconfigurable cryptologic array
collaboration
composability
Cryptography
cryptology
55nm CMOS standard-cell library
different operations similar structure reconfigurable design
feedback
feedback shift register structure
finite Field GF(2n)
Galois fields
Human behavior
human factor
Linear feedback shift registers
biblio
SCLCT: Secured cross language cipher technique
Submitted by grigby1 on Wed, 02/21/2018 - 12:44pm
Rails
Metrics
modern era possesses cryptography
open source language
Policy
Policy-Governed Secure Collaboration
privacy
pubcrawl
Rail Fence Cipher
Java
resilience
Resiliency
Scalability
SCLCT Cipher
secret codes
secured cross language cipher technique
security
cryptology
Caesar Cipher
cipher text
Ciphers
CLCT Cipher
collaboration
composability
computing device
Cryptography
automation
data privacy
empowering citizens
encryption
evolving digitization
fascinating science
Human behavior
human factor
biblio
Implementation and optimization of A5-1 algorithm on coarse-grained reconfigurable cryptographic logic array
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
resource allocation
Microelectronic Security
Noise measurement
performance optimization
pubcrawl
real-time requirements
reconfigurable architectures
resilience
Resiliency
Metrics
resource consumption
resource-based path seeking algorithm
RPS adaptive algorithm
shift registers
stream cipher
telecommunication security
Throughput
voice data encryption
coarse-grained reconfigurable cryptographic logic array
A5-1 algorithm optimization
Algorithm design and analysis
application specific integrated circuits
ASIC
bit rate 162.87 Mbit/s
cellular radio
CGRCA
Ciphers
A5-1
composability
Conferences
Cryptography
field programmable gate arrays
FPGA
frequency 162.87 MHz
GSM
biblio
Secure authentication on the Internet of Things
Submitted by grigby1 on Thu, 02/15/2018 - 10:49am
lightweight cryptographic algorithms
user credential protection
universal access
Servers
resource constrained environments
Resiliency
resilience
pubcrawl
Protocols
Phishing
mutual multifactor authentication
multifactor authentication
Metrics
memory requirements
man-in-the-middle attacks
authentication
Internet of Things
Human Factors
human factor
Human behavior
Cryptography
Cryptographic Protocols
confidential communications
Computer crime
code size
Ciphers
biometrics (access control)
biometrics
biometric-based cryptographic techniques
biometric authenticated key exchange protocol
biblio
Chaining trusted links by deploying secured physical identities
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
pubcrawl
unclonable physical tokens
Trust management
trusted links
trusted link
Trust Chaining by Physical Tokens
smart devices
security of data
security chain
secured physical identities
Secret Unkown Cipher
secret unknown ciphers
Scalability
Resiliency
authentication
Protocols
physical clone-resistant identities
Object recognition
Internet of Things
intermediate node
Identity management
Human behavior
generic node authentication protocols
Cryptography
Cryptographic Protocols
clone-resistant physical identity
Ciphers
biblio
Accelerated Encryption Algorithms for Secure Storage and Processing in the Cloud
Submitted by grigby1 on Tue, 02/06/2018 - 12:47pm
pubcrawl
graphics processing units
Homomorphic encryption
Metrics
parallel processing
partially homomorphic encryption schemes
PPSP-in-Cloud Platform
Privacy Preserving Speech Processing
privacy preserving speech processing framework architecture
gpu computing
Resiliency
Scalability
Secure computation
speech processing
storage management
Symmetric-Key Cryptography
symmetric-key encryptions
Ciphers
accelerated encryption framework
Acceleration
AES
AES implementation
Big Data
big data security in the cloud
Big Data storage/processing
Bilinear Pairing
accelerated encryption algorithms
Cloud Computing
cloud processing security
cloud storage security
Cryptography
data privacy
design specification
encryption
biblio
Securing qr codes by rsa on fpga
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Modular Multiplication
XSG
VHDL
RSA
Resiliency
Receivers
QR codes
Public key
pubcrawl
Ciphers
modular exponentiation
image security
FPGA
field programmable gate arrays
encryption
cyber physical systems
Cryptography
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »