Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Tamper resistance of IoT devices against electromagnnetic analysis
Submitted by grigby1 on Mon, 11/20/2017 - 11:27am
Internet of Things
Tamper resistance
SIMECK
security of IoT device
Resiliency
resilience
pubcrawl
lightweight block ciphers
lightweight block cipher
IoT devices
Ciphers
Hardware Security
Hardware
FPGA
field programmable gate arrays
electromagnetic waves
Electromagnetic scattering
electromagnetic analysis
Cryptography
composability
biblio
Security analysis of the RBS block cipher
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
radiofrequency identification
Wireless communication
Time Frequency Analysis
Time complexity
telecommunication security
Security analysis
security
Scalability
S-box
RFID systems
Resiliency
RBS design
RBS block cipher
radiofrequency identification systems
Algorithm design and analysis
pubcrawl
P-box
Metrics
lightweight encryption algorithm
encryption key
encryption
decryptions
data complexity
Cryptography
conventional block cipher elements
computational complexity
Ciphers
authentication
biblio
Coordination middleware for secure wireless sensor networks
Submitted by grigby1 on Mon, 11/13/2017 - 10:50am
middleware
WSN security
wireless sensor networks
telecommunication security
telecommunication computing
security modules
security
secure wireless sensor networks
Resiliency
pubcrawl
personal information
authentication
Internet-of-Things applications
Internet of Things
encryption
Cryptography
coordination middleware
control network devices
composability
collaboration
Ciphers
biblio
Backchanneling Quantum Bit (Qubit) 'Shuffling': Quantum Bit (Qubit) 'Shuffling' as Added Security by Slipstreaming Q-Morse
Submitted by grigby1 on Fri, 11/03/2017 - 10:33am
random radicals
predicted-expected sender-receiver properties
pubcrawl
public key cryptography
Quantum bit (Qubit)
quantum computing
quantum cryptography
quantum cyphers
Quantum entanglement
Morse
Resiliency
Rivest-Shamir-Adleman
RSA
Scalability
sensors
Shuffling
slipstreaming Q-Morse code
containment wave
backchanneling qubit shuffling
Backchannelling
backchannelling quantum Morse code
blockchain ledger history
blockchain security
Ciphers
codes
communication security
backchanneling quantum bit shuffling
Cypher
digital signature algorithm
DSA
ECDSA
elliptic curve digital signature algorithm
Entanglement
Internet of Things
biblio
Providing advanced security mechanism for scalable data sharing in cloud storage
Submitted by grigby1 on Fri, 11/03/2017 - 10:30am
public key cryptography
trees (mathematics)
tree structure
standards
smart cards
Smart card
single key file encryption
Servers
security of data
secret key aggregation
Scalable Security
scalable data sharing
Scalability
public-key cryptosystems
advanced security mechanism
public key crypto system
pubcrawl
KAC
encryption
decryption right allocation
data handling
cloud storage
Cloud Computing
Ciphers
cipher texts
cipher text
Aggregates
biblio
An efficient hardware implementation of few lightweight block cipher
Submitted by grigby1 on Wed, 03/08/2017 - 1:33pm
FPGA
sensor node
security system
Schedules
RFID
resource-efficient cryptographic incipient
radiofrequency identification
radio-frequency identification
pubcrawl170112
high level synthesis
Hardware Implementation
Hardware
Algorithm design and analysis
field programmable gate arrays
Field Programmable Gate Array (FPGA)
FeW lightweight block cipher
FeW cryptography algorithm
FeW Algorithm
Feistel structure
encryption
Cryptography
Ciphers
Block Cipher
biblio
"Secured data communication system using RSA with mersenne primes and Steganography"
Submitted by grigby1 on Tue, 02/14/2017 - 11:59am
image file
Steganography
secured data communication system
RSA cipher
public key cryptography
Public key
pubcrawl170102
Prime RSA
Mersenne primes
Mersenne
arrays
Image color analysis
Image coding
hidden text
factorization
encryption
data communication
Cryptography
communication channel
Ciphers
biblio
"Algorithm for secure visual communication"
Submitted by grigby1 on Tue, 02/14/2017 - 11:33am
RC4
XOR operation
video encryption
video data transmission
video data storage space
video data handling
video conference
Video communication
video coding
teleconferencing
telecommunication security
telecommunication network reliability
symmetric hierarchical encryption
Streaming media
Signal processing algorithms
secure visual communication
Ciphers
public channel
pubcrawl170102
privacy
network bandwidth availability
multimedia encryption scheme
Multimedia communication
malicious intervention
lightweight selective encryption algorithm
H.264/AVC
GDH.3
entropy coding
encryption
economic utilization
data privacy
Cryptography
biblio
"New Secured Steganography Algorithm Using Encrypted Secret Message inside QRTM Code: System Implemented in Android Phone"
Submitted by grigby1 on Tue, 02/14/2017 - 11:16am
encryption
three-step security
Steganography
standards
smart phones
secured steganography algorithm
QRTM Code
QR codes
QR code
pubcrawl170102
mobile radio
android
encrypted secret message
Cryptography
cryptanalysis
Computers
computer science
Ciphers
bit level columnar transposition method
Android phone
Android mobile environment
biblio
"Fault Detection and Correction in Processing AES Encryption Algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 12:52pm
production faults
fault diagnosis
fault injection attack
fault-tolerance technique design
field programmable gate arrays
FPGA technology
Hardware
linear mappings
MC transformation
MixColumn transformation
noise effects
fault detection technique
pubcrawl170102
radiation effect
ShiftRow transformation
side-channel attacks
Single event upsets
SR transformation
system reliability improvement
system security improvement
temporary redundant check words
encryption
AES cipher
AES encryption algorithm
AES Encryption process
AES linear mappings and error correcting codes
AES round structure
Ciphers
Cryptography
cryptosystem
ECC properties
advanced encryption standard
error control mechanisms
error correction
error detection
error syndrome
Execution errors and countermeasure against fault injection side channel attacks
fault correction technique
fault coverage
fault detection
Fault detection and correction
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »