Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
symmetric encryption
biblio
Implementation of Efficient Hybrid Encryption Technique
Submitted by grigby1 on Thu, 07/13/2023 - 11:46am
composability
Asymmetric Encryption
efficient encryption
ECDH
symmetric encryption
Elliptic curves
ECC
Multimedia systems
Elliptic curve cryptography
encryption
Computational modeling
Protocols
authentication
AES
Resiliency
resilience
pubcrawl
biblio
Secure Turbo-Polar Codes Information Transmission on Wireless Channel
Submitted by aekwall on Fri, 07/01/2022 - 8:48am
channel coding
codes
composability
Conferences
convolution
Convolutional codes
Error analysis
joint channel-encryption coding
Metrics
parallel concatenated convolutional codes
pubcrawl
Resiliency
simulation
symmetric encryption
turbo-polar codes
Wireless communication
biblio
SCKHA: A New Stream Cipher Algorithm Based on Key Hashing and Splitting Technique
Submitted by grigby1 on Thu, 06/09/2022 - 1:37pm
Ciphers
encryption
information security
pubcrawl
resilience
Throughput
authentication
Cryptography
Reliability
Compositionality
hash algorithms
stream cipher
symmetric encryption
Resiliency
Computational efficiency
Key Hashing
biblio
Use of AES Algorithm in Development of SMS Application on Android Platform
Submitted by grigby1 on Mon, 01/10/2022 - 11:15am
Metrics
symmetric encryption
SMS application
Scalability
Resiliency
resilience
Reliability
pubcrawl
optimization
AES algorithm
Message service
Market research
Internet telephony
Human behavior
Freeware
encryption
android encryption
biblio
Design of a Cloud Storage Security Encryption Algorithm for Power Bidding System
Submitted by aekwall on Mon, 01/25/2021 - 11:57am
file storage
Tendering and bidding
symmetrical encryption algorithm
symmetric encryption
storage management
Resiliency
public key cryptography
pubcrawl
power system security
power markets
power bidding system
plaintext upload file
Metrics
hybrid encryption method
Human behavior
file upload
AES
file encryption strength
file block
Electricity supply industry
ECC
composability
cloud storage security encryption algorithm
cloud storage files
cloud storage environment
cloud storage
cloud data storage
Cloud Computing
ciphertext file
asymmetric encryption algorithm
Asymmetric Encryption
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
encryption
traditional cryptography algorithms
symmetric encryption
symmetric cipher
stream cipher
Salsa20
pseudorandom keys
NIST suite
NIST
lightweight cryptography
information technology
Information systems
hybrid modified lightweight algorithm
generated sequence keys
chaotic cryptography
data communication
cryptography algorithms PRESENT
Cryptography
Constrained Devices
computational complexity
Classification algorithms
Ciphers
cipher algorithm
chaotic system
chaotic communication
block ciphers
2D logistic map
pubcrawl
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 9:58am
man-in-the-middle
weak point
update package encryption process
update
target hardware
symmetric encryption algorithms
symmetric encryption
specific encryption algorithms
secure update process
secure firmware update
safety critical operations
potential attackers
man-in-the-middle attacks
great numbers
asymmetric encryption algorithms
Asymmetric Encryption
security
Hash functions
intellectual property
confidentiality
authenticity
Embedded System
firmware
Metrics
composability
pubcrawl
Resiliency
embedded devices
embedded systems
telecommunication security
Cryptography
biblio
Studied on Application of Double Encryption Algorithm in Covert Channel Transmission
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
intelligent mobile terminal
Transportation
transmission process
telecommunication security
symmetric encryption
smart cities
Security transmission
Scalability
RSA
resilience
mobile terminal data transmission
mobile intelligent terminal
mobile computing
asymmetric encryption algorithm
file transfer
double encryption algorithm
Double encryption
DES
Cryptography
covert transmission
covert channels
covert channel transmission
covert channel
Conferences
Compositionality
Big Data
1
2
next ›
last »