Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signature
biblio
A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network
Submitted by grigby1 on Fri, 08/26/2022 - 10:23am
Online banking
SM2-CSA
SM2 Algorithm
Cooperative-Signature Algorithm
Teleworking
Computational efficiency
Mobility
Concurrency
Elliptic curves
digital signature
security
Mobile handsets
Complexity theory
Metrics
sensors
composability
Resiliency
resilience
pubcrawl
biblio
Malicious Vehicles Identifying and Trust Management Algorithm for Enhance the Security in 5G-VANET
Submitted by grigby1 on Wed, 08/10/2022 - 1:42pm
vehicular ad hoc networks
Trust Routing
Secret key
NOMA
Node trust
group re-cipher key
group public key
information trust
hash chain
Interference
security
Clustering algorithms
Prediction algorithms
composability
digital signature
Scalability
Conferences
Resiliency
resilience
pubcrawl
biblio
The Encryption of Electronic Professional Certificate by Using Digital Signature and QR Code
Submitted by aekwall on Thu, 07/14/2022 - 3:17pm
Cryptography
Software
encryption
pubcrawl
Resiliency
digital signatures
Forgery
cyber-physical systems
Publishing
QR codes
digital signature
Professional Certificate
Programming profession
QR code
research and development
Web Programming
biblio
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities
Submitted by aekwall on Thu, 07/14/2022 - 3:15pm
Phishing
QR codes
quick response code
QR code
DSA
digital signature
codes
Elliptic curves
Mobile handsets
Cryptography
cyber-physical systems
Software algorithms
Resiliency
pubcrawl
Protocols
Software
security
biblio
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
Submitted by grigby1 on Fri, 05/20/2022 - 3:31pm
pubcrawl
Hardware Security
quantum computing
Quantum mechanics
composability
side-channel attacks
Compositionality
Resistance
Power measurement
digital signature
Transforms
standardization
correlation power analysis
number theoretic transform
Post-quantum cryptography
theoretical cryptography
biblio
Secure Digital Signature Validated by Ambient User amp;\#x2019;s Wi-Fi-enabled devices
Submitted by grigby1 on Tue, 04/26/2022 - 1:50pm
public-key
Wi-Fi
validation
Servers
Seals
Scalability
RSSI
Resiliency
resilience
Receivers
digital signature
Public key
pubcrawl
private-key
Mobile handsets
information technology
email spoofing
Electronic mail
digital signatures
biblio
Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature Algorithm
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
Internet-of-Things
smart meters
smart meter
Smart Grids
Smart Grid Sensors
smart contracts
Resiliency
resilience
real-time systems
pubcrawl
machine learning
blockchains
Human Factors
Human behavior
Fog computing
Elliptic curve cryptography
digital signature
cyber-physical system
Cryptography
Computational modeling
composability
Cloud Computing
biblio
The Scalable Group Testing of Invalid Signatures based on Latin Square in Wireless Sensors Networks
Submitted by grigby1 on Tue, 03/15/2022 - 11:13am
Metrics
scalable verification
wireless sensors networks
Latin square
identification of invalid signature
Batch verification
parallel processing
Signal processing algorithms
Compositionality
encryption
Wireless communication
wireless sensor networks
digital signature
Scalability
Resiliency
resilience
pubcrawl
signal processing
biblio
Digital Signature Scheme over Lattices
Submitted by aekwall on Fri, 02/04/2022 - 9:32am
Receivers
Repudiation
Signing
digital signature
Computers
verification
key generation
Lattices
Forgery
Cryptography
composability
Human behavior
Resiliency
Metrics
pubcrawl
information technology
information security
biblio
Securing the Integrity of PDF Files using RSA Digital Signature and SHA-3 Hash Function
Submitted by aekwall on Fri, 02/04/2022 - 9:30am
verification
Repudiation
Signing
SHA-3
RSA algorithm
Portable document format
non repudiation
Keccak
file integrity
digital signature
data science
Databases
Distance measurement
public key cryptography
Hash functions
Receivers
composability
Human behavior
Resiliency
Metrics
pubcrawl
authentication
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »