Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Digital Coherent 20-Gbit/s DP-PSK Y-00 Quantum Stream Cipher Transmission over 800-km SSMF
Submitted by grigby1 on Fri, 06/19/2020 - 10:34am
light transmission
SSMF
Signal to noise ratio
signal phase level masking
Resiliency
resilience
quantum-noise signal masking
pubcrawl
Phase shift keying
Phase modulation
Optical noise
optical modulation
optical fibre communication
Metrics
217-level random phase modulation
light polarisation
level random phase modulation
HD-FEC threshold
forward error correction
fiber-optic transmission security
error statistics
encryption
dual polarization
digital coherent DP-PSK Y-00 quantum stream cipher transmission
Cryptography
composability
Ciphers
BER
biblio
Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 10:35am
Homomorphic encryption
storage management
Servers
security
Scalability
Resiliency
pubcrawl
Metrics
matrix multiplication
Matrix converters
information security
Human Factors
Ciphers
extended hill cipher encryption
Extended Hill Cipher
encryption algorithm
encryption
data storage
data privacy
Cryptography
cloud storage
cloud providers
cloud network
Cloud Computing
biblio
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
Submitted by aekwall on Mon, 06/08/2020 - 10:32am
hash collisions
hash algorithms
web portal
SHA-1
secured web portal
salt generation
salt algorithm
password hashing
matrix encryption key
Internet security
hash tables
hash message
Hash Function
Cryptography
enhanced secure hash algorithm-512
file organisation
Hash functions
Compositionality
Portals
Ciphers
password
web applications
Databases
pubcrawl
Resiliency
encryption
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
Encryption Based On Multilevel Security for Relational Database EBMSR
Submitted by aekwall on Mon, 04/20/2020 - 9:44am
Ciphers
Relational Database
multisecurity level
multilevel security model
Multi level
MLS
encryption algorithm
DBMS
cryptosystem
Bell LaPadula
RC4
AES
DES
relational database security
Cryptography
information technology
relational databases
internet
Databases
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
decryption
encryption
biblio
Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications
Submitted by grigby1 on Fri, 04/10/2020 - 11:20am
physical layer security
wireless communication protocols
typical cryptography
radiocommunication
PLS
Internet of Things applications
initial performance analysis
Force
computational power
classical cryptography
IoT devices
IoT
Ciphers
resilience
Resiliency
Metrics
composability
pubcrawl
Receivers
Protocols
Internet of Things
encryption
Cryptography
biblio
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
Submitted by aekwall on Mon, 03/30/2020 - 10:42am
quantum computers
wireless sensor networks
Wireless Sensor network communication
ubiquitous internetworking
tiny sensor nodes
telecommunication security
stage permeated filtering mechanism
security of data
Scalability
resource-aware security
Resiliency
quantum cryptography
quantum computing security
quantum computing
Pervasive Computing Security
pubcrawl
Predictive Metrics
lightweight quantum-safe security concept
Intrusion Detection Systems
internetworking
Internet of Things
filtering theory
distributed sensor nodes
contemporary cryptographic mechanisms
Computers
composability
Ciphers
Base stations
biblio
An Advance Cryptographic Solutions in Cloud Computing Security
Submitted by grigby1 on Fri, 03/27/2020 - 10:28am
Human behavior
Virtualization
Safety
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
innovative safe cloud computing design
information management
identification mechanism
Human Factors
access management
Fingerprint recognition
encoding
Cryptography
computer security
collaboration
cloud computing security
Cloud Computing
Ciphers
biometrics (access control)
biometric knowledge
biometric coding
biometric
biblio
Research on LED lightweight cryptographic algorithm based on RFID tag of Internet of things
Submitted by aekwall on Mon, 03/23/2020 - 12:33pm
LED lightweight cryptographic algorithm
search problems
RFIDs
RFID tags
RFID tag chip
RFID tag
Resiliency
radiofrequency identification
radio frequency identification tags
pubcrawl
Piccolo cryptographic algorithm
light emitting diodes
LED lightweight cryptography
Algorithm
InvS-box
Internet of Things
Human behavior
FPGA
field programmable gate arrays
DPA protection technology threshold
DPA attack
Differential Power Analysis
Cryptography
Ciphers
Boolean functions
Boolean expression reconstruction
biblio
Analysis of Key Randomness in Improved One-Time Pad Cryptography
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
random numbers
random key generation
true random number generator
shuffling algorithm
random keys
Psuedo Random Number Generator
perfect secrecy algorithm
Pearson correlation analysis
one-time pad cryptography
one-time pad
key randomness
key generation
Fisher-Yates shuffling algorithm
Fisher-Yates algorithm
Scalability
OTP
Ciphers
correlation methods
Mice
random number generation
Generators
Prediction algorithms
Metrics
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »