Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptosystems
biblio
Cryptography with information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:39pm
quantum computing
unconditionally secure schemes
trusted initializer model
power system security
long-term security
information theoretic security
Computer graphics
cryptosystems
digital signatures
information security
Scalability
information theory
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptography
biblio
On Aggregation of Information in Timing Attacks
Submitted by grigby1 on Mon, 10/05/2020 - 12:48pm
Information Flow
timing attacks
timing
system vulnerability
Side-Channels
real-world attacks
real-world adversaries
pubcrawl
program diagnostics
program compositionality
multiple timing measurements
Mathematical model
information-flow analysis
Compositionality
information aggregation reasoning
high-profile timing attacks
divide-and-conquer method
divide and conquer methods
cryptosystems
Cryptography
Computational modeling
Analytical models
Aggregates
Computing Theory and Compositionality
Human Factors
Human behavior
biblio
A Study on the Use of Quantum Computers, Risk Assessment and Security Problems
Submitted by grigby1 on Tue, 10/08/2019 - 3:42pm
Resiliency
quantum approaches
quantum computer
quantum computers
quantum computing
quantum computing security
Quantum mechanics
quantum physics
resilience
pubcrawl
risk assessment
Scalability
security
security problems
simultaneous operation
threat
wide solution space
high-resolution image
computational complexity
computer based solutions
Computers
Cryptography
cryptosystems
encryption
high complexity value
high performance
composability
information storage
internet
large-scale data processing
long processing times
Metrics
optimisation
optimization problems
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator
biblio
ID-Based Signcryption Scheme Using Extended Chaotic Maps
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
cryptosystems
security superiorities
Resiliency
public-key cryptography
public key cryptography
pubcrawl
Metrics
identity-based signcryption scheme
Identity-based signcryption
ID-based signcryption scheme
extended chaotic maps
encryption
ECM-IBSC scheme
Algorithm design and analysis
Computation efficiency
computation efficiencies
composability
Chebyshev approximation
chaotic public-key cryptography
Chaotic maps
chaotic cryptography
chaotic communication
chaos-based discrete logarithm problem
chaos
CDL problem
biblio
A new elliptic curve cryptographic system over the finite fields
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
pubcrawl
matrix algebra
Menezes Qu Vanstone encryption protocols
message authentication
Metrics
network communications
private key cryptography
private key matrices
Protocols
Mathematical model
public key cryptography
public key vectors
Resiliency
Scalability
secure communication
security
square matrices
Cayley Hamilton theorem
key exchange authentication
invertible matrix
finite fields
encryption
Elliptic curves
Elliptic curve cryptography
elliptic curve cryptographic system
ElGamal
ECC
Discrete Logarithms Problems
discrete logarithms
Diffie Hellman protocol
cyber security
cryptosystems
Cryptographic Protocols
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity