Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic algorithms
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 11:35am
fuzzy set theory
Fuzzy Cryptography
symmetric cryptographic algorithms
suitable cryptographic algorithm
SHA256
fuzzy analytic hierarchy process
FAHP
experts grading method
ECDSA
asymmetric cryptographic algorithms
financial data processing
AES
cryptographic algorithms
security
cryptocurrencies
analytic hierarchy process
Distributed databases
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Hardware
data privacy
Computational efficiency
Scalability
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
biblio
A Dual Layer Image Encryption using Polymerase Chain Reaction Amplification and DNA Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:27am
encoding
unauthorized data access
polymers
polymerase chain reaction amplification
image protection
dual layer image encryption
DNA encryption
digital image security
biological sequences
binary encoding
biocomputing
DNA cryptography
cryptographic algorithms
image encryption
authorisation
Predictive Metrics
digital images
DNA
privacy
Image coding
Data protection
pubcrawl
Human behavior
Resiliency
encryption
Data Security
Cryptography
biblio
Scalable QAM Modulation for Physical Layer Security of Wireless Networks
Submitted by aekwall on Mon, 03/16/2020 - 10:33am
wireless networks
Scalable Security
wireless channel
scalable quadrature modulation
scalable QAM
quadrature amplitude modulation
QAM modulation
OFDM
Internet of Things concept
FFT
connected devices
cryptographic algorithms
IoT
wireless channels
Scalability
energy consumption
physical layer security
Data protection
pubcrawl
IoT applications
IoT devices
Internet of Things
computer network security
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
cryptographic algorithms
reviewed protocols
Resistance
relatively old Lamport's hash-chain protocol
one-time passwords
one-time password
information technologies
e-commerce
complicated protocols
two factor authentication
two-factor authentication
Authentication Protocols
electronic commerce
Servers
protocol
Human Factors
Phishing
Fingerprint recognition
authentication
message authentication
Vulnerability
Cryptography
pubcrawl
information security
Cryptographic Protocols
biblio
An Innovative Model for the Enhancement of IoT Device Using Lightweight Cryptography
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
Lightweight algorithms
Wireless Sensorȍ Networksȍ(WSN)
telecommunication security
security system
Scalability
Safety
resource constrained devices
Resiliency
RadioȍFrequency ȍIdentification (RFID)
pubcrawl
privacy
lightweight cryptography
Lightweight Ciphers
batteries
IoT device
InternetȍofȍThings(IOT)
Internet of Things
hash algorithm
data privacy
Cryptography
cryptographic algorithms
commutation layer
Cloud Computing
Ciphers
Block Cipher
biblio
Double Encryption Using TEA and DNA
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
Ciphers
TEA
secure network communication
passive attacks
Double encryption
data intruders
active attacks
active and passive attacks
decryption time
Resiliency
cryptographic algorithms
DNA
privacy
digital signatures
Data Security
Receivers
Data Transmission
information security
Cryptography
encryption
Metrics
Human behavior
pubcrawl
resilience
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
Submitted by grigby1 on Thu, 02/14/2019 - 11:19am
NIST post-quantum cryptography project submissions
validation tools
tools
taint analysis
static analysis
source code
quantum cryptography
pubcrawl
Proposals
program diagnostics
post-quantum cryptography algorithms
NIST post-quantum standardization project
cache storage
NIST
Metrics
leakage pattern detection
execution behavior
encryption
development cycle
dedicated vulnerability research tool
cryptographic algorithms
composability
cache-timing vulnerabilities
cache-timing attacks
biblio
Secured Dual-Rail-Precharge Mux-based (DPMUX) symmetric-logic for low voltage applications
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
processed data
Metrics
Microelectronics Security
PAA
power analysis attacks
power consumption
Power dissipation
private key cryptography
probability
Probability distribution
low-power electronics
pubcrawl
resilience
Resiliency
secret cryptographic keys
secured dual-rail-precharge mux
side channel attack
Signal to noise ratio
Switches
DPMUX symmetric-logic
average power dissipation
clock cycle
combinatorial logic
composability
cryptographic algorithms
Cryptography
delays
deterministic power
Digital circuits
activity factor
dynamic switching energy
Hardware implementations
Information Leakage
linear relationship
logic circuits
logic design
Logic gates
low voltage applications
1
2
next ›
last »