Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
decryption process
biblio
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
microprocessor chips
RSA-OAEP encryption scheme
RSA-OAEP cryptosystem
Rivest-Shamir-Adleman (RSA)
Raspbian OS
Raspbian
Raspberry Pi setup
Raspberry Pi
Rabin-P encryption scheme
Rabin-p cryptosystem
Rabin-p
public key cryptography
pubcrawl
Optimal Asymmetric Encryption Padding (OAEP)
microprocessor platform
exponentiation
Metrics
Linux operating system
Linux
Internet of Things structure
Internet of Things
Human behavior
energy consumption
encryption
embedded devices
decryption process
composability
Asymmetric Encryption
Scalability
Resiliency
biblio
A Secure Voice Channel using Chaotic Cryptography Algorithm
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
secure voice channel
communicaiton channel prototype
decryption process
encrypted channel
encryption process
encryption-decription cycle
FPGA Spartan-3
high processing speed
nonecrypted channel
Cipher feedback mode
secure voice communications channel
secured channel
secured communication channel
Spartan-3 FPGA board
time 202.0 mus
unwanted eavesdropping
voice communication
voice messages
Ciphers
Cryptography
encryption
Receivers
telecommunication security
eavesdropping
Resiliency
pubcrawl
composability
field programmable gate arrays
Predictive Metrics
chaotic communication
asynchronous communication
chaotic cryptographic algorithm
chaotic cryptography
chaotic cryptography algorithm
chiper feedback
biblio
Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Resiliency
Human behavior
information
information and communication systems
Metrics
pubcrawl
Public key
public key cryptography
public key cryptography system
resilience
encryption process
Rivest
RSA
RSA 1024
RSA algorithm
RSA encryption
Scalability
security
security system analysis
Shamir
digital signature
Asymmetric Encryption
asymmetric keys
authentication
combination method
Communication networks
composability
Compositionality
Data Security
decryption process
and Adleman algorithm
digital signatures
digital signature algorithm
Digital Signature Standard
DSA
DSA 512
DSA algorithms
DSS
encryption
biblio
A Practical Quantum Public-Key Encryption Model
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
public key cryptography
secret keys
Resiliency
resilience
quantum trapdoor one-way function
quantum public-key encryption model
quantum public key encryption model
Quantum mechanics
quantum information security
quantum cryptography
quantum computing
black box encryption
Public key
pubcrawl
Metrics
encryption
decryption process
Computational modeling
computational indistinguishability
composability
blackbox client-side
biblio
Application H-Secure for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 1:16pm
mobile operating system
Graphical Password
graphical user interfaces
H-Secure application
invasive software
malicious code
malware
Mobile communication
mobile computing
Mobile handsets
free-download content
mobile operating systems
mobile security applications
open devices
personal data
private key cryptography
Servers
smart phones
unauthorized person
Web server
confidential file storage
Android (operating system)
Android smart phones
application stores
authentication
authorisation
business applications
business data
confidential business information
confidential data storage
AES Encryption and Decryption
data access
decryption process
destination servers
employee-owned device
encrypted file
encryption
encryption key
free-download apps