Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signature
biblio
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
Resistance
hash algorithms
permutation
One-way Function
message integrity
message authenticity
cryptographic hash functions
Cryptographic Hash Function
cellular automata based hashing algorithm
cellular automata
CABHA algorithm
Cryptography
Compositionality
digital signature
computer science
automata
finite element analysis
cryptographic applications
message authentication
pubcrawl
Resiliency
information security
biblio
Keystroke Dynamics Using Auto Encoders
Submitted by grigby1 on Tue, 01/28/2020 - 2:35pm
Human Factors
Training
timing
stolen credentials
risk based approach
pubcrawl
password
Metrics
message authentication
machine learning
learning (artificial intelligence)
Keystrokes Dynamics
keystroke dynamics
keystroke analysis
individual user
anomalous typing patterns
Human behavior
Heuristic algorithms
fraud
feature extraction
dynamic flags
digital signatures
digital signature
Cyber Attacks
credential based authentication systems
biometrics (access control)
autoencoders
authorisation
authentication
biblio
Digital Signatures and Signcryption Schemes on Embedded Devices: A Trade-off Between Computation and Storage
Submitted by aekwall on Mon, 01/06/2020 - 10:38am
Scalability
digital signature
Resiliency
pubcrawl
Internet of Things
digital signatures
health sensor platform
precomputation
public-key cryptography
Schnorr
Signcryption
storage encryption
biblio
Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
Elliptic curve cryptography
public signature verification problem
proxy signature scheme
private key exposure
FoSPS
forward secure proxy signature
directed signature scheme
cryptoanalysis
Computer security and privacy
handwriting recognition
ECC
Scalability
Security analysis
public key cryptography
digital signatures
pubcrawl
Resiliency
private key cryptography
data privacy
Computational efficiency
digital signature
biblio
A variant of the Schnorr signature using an elliptic curve over a field of characteristic two
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
pubcrawl
standards
software engineering
Schnorr signature scheme
Schnorr signature
scalar multiplication
Scalability
Resiliency
public key cryptography
authentication
koblitz Curve
Elliptic curves
elliptic curve
double-and-add scalar multiplication
digital signatures
digital signature
computer science
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Document Certificate Authentication System Using Digitally Signed QR Code Tag
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
Cryptography
Resiliency
pubcrawl
authentication
cyber physical systems
Degree certificate
digital signature
encryption key
QR code
QR codes
biblio
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
Submitted by aekwall on Mon, 09/23/2019 - 10:26am
digital signature
Cryptography
Resiliency
pubcrawl
Cloud Security
Predictive Metrics
remote data audit
provable security
Compositionality
biblio
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM
Submitted by aekwall on Mon, 03/18/2019 - 9:53am
key sizes
black box encryption
quantum random oracle models
quantum cryptography
quantum computing
public key cryptography
Public key
postquantum security
post-quantum cryptographic schemes
post-quantum cryptographic primitives
post quantum cryptography
module lattices
Learning with errors
Lattices
key-establishment protocols
key-encapsulation mechanism
digital signature
key encapsulation
CRYSTALS - Kyber
CPA-secure public-key encryption scheme
ciphertext sizes
CCA-secure module-lattice-based KEM
CCA-secure KEM
authenticated-key-exchange schemes
Metrics
composability
pubcrawl
Resiliency
Electronic mail
Protocols
Cryptographic Protocols
encryption
biblio
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
attribute based encryption
collaboration
digital signature
digital signatures
gaussian sampling
Human behavior
lattice-based cryptography
policy-based governance
pubcrawl
Resiliency
ring-lwe
Scalability
trapdoor
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »