Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signature
biblio
A Digital Signature System Based on Real Time Face Recognition
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
biometric encryption
digital signature
face recognition
LBPH
Metrics
pubcrawl
resilience
Resiliency
RSA
Scalability
SHA256
biblio
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
IoT security
Xilinx platform studio tool
Virtex-5 xc5vfx70t device based platform
Software
secure data transaction
Scalability
RNS implementation
Resiliency
resilience
residue number systems
residue number system (RNS)
residue number system
public key cryptography
pubcrawl
Metrics
IoT Security.
C language
Internet of Things
hardware-software codesign implementation
hardware-software codesign
Hardware software codesign
Hardware
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC cipher
digital signatures
digital signature
compute-intensive components
Communication Systems
Ciphers
biblio
Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
ECC
State Cryptography Administration
SM2 signature generation schemes
SM2 digital signature generation
SM2
secure cloud cryptography computing
secret sharing based cryptography
key exchange schemes
elliptic curve public key cryptography algorithm
additively homomorphic encryption
China
secret sharing
Homomorphic encryption
Cloud Computing
Elliptic curves
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
Software
data encryption
encryption
digital signature
Scalability
biblio
ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
cloud
ROM
produced signature
issued signature
Intenet of Things
ID-based strong designated verifier signature scheme
ID-based signature scheme
Electrical Engineering
Designated verifier signature
designated verifier
BDH
random oracle model
Cloud Computing
sensors
Bilinear Pairing
Smart Home
Public key
digital signatures
pubcrawl
Resiliency
provable security
Internet of Things
digital signature
Scalability
biblio
Code-Based Schemes for Post-Quantum Digital Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Complexity theory
quantum security
post-quantum digital signatures
electronic digital signature
code-based schemes
code-based cryptography
CFS scheme
quantum computing
Post-quantum cryptography
Scalability
quantum cryptography
public key cryptography
Public key
digital signatures
Decoding
pubcrawl
Resiliency
digital signature
biblio
A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
bilinear pairings
strong designated verifier
signer ambiguity
signature length
random oracle model
public key system
nontransferability
group-oriented strong designated verifier signature scheme
group-oriented
GO-SDVS scheme
constant-size signatures
constant-size
Scalability
adaptive chosen-message attacks
Oceans
computer science
handwriting recognition
public key cryptography
Public key
digital signatures
Generators
pubcrawl
Resiliency
digital signature
biblio
A Design of Digital Signature Mechanism in NDN-IP Gateway
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Internet architecture
TCP/IP technology
NDN-TCP/IP
NDN-IP gateway
NDN-IP Custom-Router Gateway
NDN-based network implementation
IP-based network
IP addresses
gateway
digital signature processing
digital signature mechanism
data naming
data authenticity
computer network security
digital signature
named data networking
NDN
internetworking
digital signatures
internet
pubcrawl
Resiliency
security
Scalability
IP networks
biblio
A New Approach of Digital Signature Verification based on BioGamal Algorithm
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Communication Network
SHA algorithm
secured digital signature algorithm
secure hash code
secure digital signature
existing PlayGamal algorithm
digital signature verification
BioGamal algorithm
encryption algorithm
sensitive information
security of data
digital signature
verification
digital signatures
Cryptography
pubcrawl
Resiliency
security
Data Security
Scalability
biblio
Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
message exchange
Service robots
service robot
security
Scalability
RSA algorithm
Resiliency
public key cryptography
Public key
pubcrawl
message transmission
message integrity
cloud
message encryption
message decryption
message authentication
intelligent robots
encryption
digital signatures
digital signature algorithm
digital signature
control engineering computing
cloud intelligent robot
Cloud Computing
biblio
Constructing a Digital Signature Algorithm Based on the Difficulty of Some Expanded Root Problems
Submitted by aekwall on Mon, 06/22/2020 - 11:24am
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
computer science
digital signature
digital signature algorithm
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »