Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data communication
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
Submitted by aekwall on Mon, 08/24/2020 - 12:47pm
Ciphers
Autonomic Security
security process
production equipment
product customisation
MQTT infrastructure
manufacturing enterprises
industry 4.0 environments
generic autonomic management framework
data transmission flexibility
customized production processes
anomaly detection methods
security of data
data communication
quality of service
Anomaly Detection
business process
production engineering computing
Industries
composability
pubcrawl
Resiliency
Servers
biblio
An Extensible and Transparent Thing-to-Thing Security Enhancement for MQTT Protocol in IoT Environment
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
queueing theory
MQTT broker
MQTT protocol
MQTT Thing-to-Thing Security
MQTT-TLS
MQTT-TTS
Payloads
Protocols
pubcrawl
Metrics
resilience
Resiliency
secure data exchange
telemetry
thing-to-broker channel encryption
Thing-to-Thing Security enhancement
Transport Layer Security
Human behavior
composability
computer network security
Cryptographic Protocols
data communication
data exchange protocol
electronic data interchange
encryption
end-to-end security
ciphertext-policy attribute based encryption
Human Factors
Internet of Things
Internet of things environment
IoT application developers
IoT security
massive IoT devices
Message Queue Telemetry Transport
biblio
Proposal of Equal-Weight (2, 2) Visual Secret Sharing Scheme on VN-CSK Illumination Light Communication
Submitted by aekwall on Mon, 07/13/2020 - 11:17am
Scalability
Modified Pseudo-Orthogonal M-sequence
occurence probability
optical transmitters
orthogonal codes
probability
pubcrawl
Receivers
Resiliency
Metrics
secret data
telecommunication security
variable N-parallel code-shift-keying system
Visual Light Communications Security
visual secret sharing scheme
VN-CSK illumination light communication
VN-CSK system
adjacent illumination light interference
m-sequences
lighting function
lighting
light signal
light emitting diodes
indoor visible light communication channel
illumination light overlapping area
free-space optical communication
error statistics
Distributed databases
dimming control problem
data communication
Cryptography
constant illuminance
bit error rate performance
biblio
Secure Network-on-Chip Architectures for MPSoC: Overview and Challenges
Submitted by grigby1 on Fri, 05/15/2020 - 12:29pm
multiprocessing systems
Trojan horses
security threat attacks
security
secure routing algorithms
secure routing algorithm
secure network-on-chip architectures
Routing
processing cores
NoC-based systems
NoC
network-on-chip
multiprocessor-based systems on chip
pubcrawl
MPSoC
Malicious-Tolerant Routing Algorithms
HT
hardware trojan
Hardware
data communication
computer architecture
Metrics
resilience
Resiliency
Scalability
network on chip security
biblio
Nodal Authentication of IoT Data Using Blockchain
Submitted by grigby1 on Fri, 04/10/2020 - 12:53pm
IoT data
Cloud Security
connected nodes
cryptocurrencies
cyber-attacks
data communication
data integrity security
GOST algorithm
home automation
cloud computing security
IoT field
nodal authentication
nodal verification
pervasive systems
self organizing networks
transmitted data
Pervasive Computing Security
Human Factors
data integrity
Internet of Things
industrial applications
security of data
authentication
Scalability
computer architecture
blockchain
Cloud Computing
Cryptography
pubcrawl
Metrics
Resiliency
resilience
Human behavior
IoT
agriculture applications
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
biblio
A High-Speed Key Management Method for Quantum Key Distribution Network
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
quantum key distribution network
one-time pad tunnel manager
Photonics
private key cryptography
pubcrawl
public key cryptography
QKD key generation
QKD network
quantum cryptography
Quantum Key Distribution
one-time pad
Receivers
resilience
Resiliency
Scalability
secure communication
transparent encryption link
unconditional secure communication
Web API
high-speed key management method
application communication
application key consumption
application program interfaces
data communication
eavesdropping
encryption
encryption key sharing
global key manager
adjacent nodes
high-speed method
high-speed QKD system
Human behavior
Human Factors
key management
local key manager
Metrics
network systems
biblio
Research on Security Protection Technology System of Power Internet of Things
Submitted by grigby1 on Tue, 01/21/2020 - 11:39am
real-time security monitoring
power grid transmission
power grids
power Internet of Things
Power system protection
power system security
privacy protection
production links
Protocols
pubcrawl
power engineering computing
resilience
Resiliency
Scalability
security
security monitoring
security protection technology system
sensor security
sensors
terminal identity authentication
edge area autonomy
application security risks
authentication
authority control
Cloud Computing
computer architecture
computer network management
computer network security
data communication
data transmission protection
application layer cloud fog security management
edge computing
fog calculation
Fog computing
Human behavior
internet
Internet of Things
Metrics
network security
Network Security Architecture
biblio
Three-phase AC-DC Converter for EV Rapid Charging with Wireless Communication for Decentralized Controller
Submitted by aekwall on Mon, 01/20/2020 - 11:47am
expandability
Wireless communication
Voltage control
total harmonic distortion
Resiliency
pubcrawl
power 3.0 kW
output voltage control
multimodular AC-DC converter system
input current control
harmonic distortion
AC-DC converter
EV rapid charging
Electric Vehicles
electric vehicle charging
electric current control
droop control
decentralized controller
decentralised control
data communication
composability
AC-DC power convertors
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »