Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confidentiality
biblio
VPNoT: End to End Encrypted Tunnel Based on OpenVPN and Raspberry Pi for IoT Security
Submitted by aekwall on Mon, 03/14/2022 - 1:44pm
Predictive Metrics
Router Systems Security
vpnot
vpn
tunnel
Transport Layer Security
Raspberry Pi
OpenVPN
integrity
Costs
Virtual private networks
Logic gates
Media
confidentiality
IoT
Resiliency
pubcrawl
encryption
Linux
authentication
sensors
security
biblio
A Hybrid Encryption Approach for Secured Authentication and Enhancement in Confidentiality of Data
Submitted by grigby1 on Thu, 02/10/2022 - 3:19pm
honey
Homomorphic
encryption
digital communication
Data Security
confidentiality
authentication
biblio
Personal Trusted Platform Module for the Multi-Core System of 5G Security and Privacy
Submitted by grigby1 on Mon, 11/08/2021 - 1:44pm
Internet of Things
МС 127.05 module
Virtualization Based Security
ULSI 1879VM8Ya
trusted platform modules
Trusted Platform Module
Resiliency
resilience
policy setting
NeuroMatrix Core 4
MPSoC
pubcrawl
Internet of smart (mobile) CPSs
cyber-physical systems
cyber physical systems
cyber physical security
confidentiality
computer security
composability
blocking application
ARM Cortex-A5
biblio
Linux Privilege Increase Threat Analysis
Submitted by grigby1 on Tue, 08/17/2021 - 3:55pm
composability
confidentiality
information security
Linux operating system
Linux Operating System Security
Metrics
operating system
privilege increase
pubcrawl
resilience
Resiliency
rights differentiation
Vulnerability
biblio
Secure Coded Matrix Multiplication Against Cooperative Attack in Edge Computing
Submitted by aekwall on Tue, 06/01/2021 - 1:30pm
heterogeneous networks
trust
total cost
sufficient conditions
Servers
security
Resiliency
pubcrawl
linear coding
Human Factors
Computing Theory
encoding
edge computing
data privacy
cooperative attack
confidentiality
Computing Theory and Trust
Computing Theory and Privacy
composability
privacy
biblio
Improving the Confidentiality of VLC Channels: Physical-Layer Security Approaches
Submitted by aekwall on Tue, 05/18/2021 - 3:15pm
Scalability
encryption
Resiliency
pubcrawl
Wireless communication
Metrics
physical-layer security
confidentiality
OFDM
optical transmitters
visible light communication
modulation
Visible Light Communications Security
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
Image Steganography Method to Achieve Confidentiality Using CAPTCHA for Authentication
Submitted by grigby1 on Thu, 03/18/2021 - 2:36pm
encryption
user interfaces
telecommunication security
Steganography
randomized CAPTCHA code
pubcrawl
police department
medical fields
least significant bit
intended receiver
image steganography method
image data
image colour analysis
Image coding
image
Human behavior
achieve confidentiality
detective investigation
decryption mechanism
decryption
decoding tools
data hiding technique
data encapsulation
Cryptography
confidentiality
composability
captchas
CAPTCHA codes
CAPTCHA
authorisation
authentication
authenticated user
biblio
Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
B-curves
standard methods
single design
resource sharing
P-curves
NIST Elliptic Curves
implemented designs
high-speed design
hardware components bus
frequency 1.0 GHz
exchanged messages
encrypting signing messages
field programmable gate arrays
modern communication systems
SCA
confidentiality
ECC
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
Scalability
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
man-in-the-middle attack
Signing
sender identity
security
Scalability
Resiliency
public key cryptography
Public key
pubcrawl
private key cryptography
message integrity
message authentication
authentication
integrity
encryption
digital world
digital signatures
digital signature
digital era
cyber-attacks
Cryptography
cryptographic key pairs
confidentiality
Conferences
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »