Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
MD5
biblio
Design and implementation of efficient hash functions
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
pubcrawl
resilience
Resiliency
Conferences
network security
power electronics
Compositionality
Hash Function
Hash functions
hash algorithms
Computer applications
Focusing
passwords
MD5
biblio
Ibn Omar Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:54pm
Hash functions
SHA-512
MD5
Ibn Omar
SHA-256
passwords
Linguistics
hash algorithms
hash
information security
Force
Compositionality
Complexity theory
privacy
Resiliency
resilience
pubcrawl
biblio
RAD: Reinforcement Authentication DYMO Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:04am
demand protocol
Secret key
Compositionality
Encryption technique
mobility management (mobile radio)
malicious node
MANET security
authentication technique
average throughput
cryptographic operations
mobile ad hoc network
DYMO
dynamic MANET
infrastructure centralized server
MD5
Message Digest 5
RAD
reinforcement authentication DYMO protocol
Reinforcement.
Routing protocols
telecommunication security
Cryptographic Protocols
learning (artificial intelligence)
Resiliency
pubcrawl
Routing
Metrics
Reinforcement learning
authentication
encryption
message authentication
packet delivery ratio
telecommunication computing
delays
MANET
mobile ad hoc networks
Throughput
end to end delay
biblio
A novel security mechanism using hybrid cryptography algorithms
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
AES
Algorithm design and analysis
Compositionality
encryption
hash algorithms
Hybrid Cryptography
MD5
Protocols
pubcrawl
Public key
Receivers
Resiliency
RSA
security
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 11:47am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
An efficient parallel algorithm for hash computation in security and forensics applications
Submitted by BrandonB on Wed, 05/06/2015 - 11:02am
information security
standards
standard hash function
SHA-1 algorithm
SHA-1
Program processors
probability
parallel algorithms
parallel algorithm
OpenMP API
OpenMP
Multicore Processors
Multicore processing
MD5
Algorithm design and analysis
hashing algorithms
hash computation
file organisation
digital signatures
digital signature
Digital Forensics
data preservation
Cryptography
Cryptographic Hash Function
Conferences
collision probability
application program interfaces
biblio
Implementation of security framework for multiple web applications
Submitted by BrandonB on Mon, 05/04/2015 - 2:51pm
MD5
web services
web applications
single sign-on
Servers
security of data
security framework implementation
proxy signature
OpenID
authentication
Informatics
identity management technique
identity management system
encryption
credential problems
Computers
authorization
authentication server