Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mathematics
biblio
Analysis of S-Box Based on Image Encryption Application Using Complex Fuzzy Credibility Frank Aggregation Operators
Submitted by grigby1 on Mon, 07/31/2023 - 1:26pm
Power measurement
fuzzy credibility numbers
Frank T-norm
complex fuzzy set
fuzzy set
Fuzzy Cryptography
Fuzzy sets
S-box
Mathematics
encryption
uncertainty
Decision Making
Scalability
Correlation
Resiliency
resilience
Metrics
pubcrawl
biblio
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
key generation
encryption system
Dynamic Key
random key generation
Resiliency
Iris
biometrics
randomness
Image color analysis
Mathematics
encryption
resilience
NIST
authentication
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
Cloud Computing
biblio
An Improvement on “CryptCloud$^\textrm+\$$: Secure and Expressive Data Access Control for Cloud Storage”
Submitted by grigby1 on Tue, 12/20/2022 - 7:30pm
public key cryptography
Authority Accountability
abe
auditing
Traceability
revocation
white box cryptography
Mathematics
Electronic mail
encryption
Computer bugs
composability
Access Control
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
Eigen-Fingerprints-Based Remote Authentication Cryptosystem
Submitted by grigby1 on Tue, 09/20/2022 - 2:34pm
biometrics (access control)
Fuzzy Cryptography
Remote authentication
Key Binding
fuzzy vault
fuzzy commitment
Eigen-Fingerprints
codes
Resiliency
Internet of Things
Mathematics
wireless networks
Cryptography
Scalability
resilience
Metrics
pubcrawl
feature extraction
biblio
A Secured Quantum Key Exchange Algorithm using Fermat Numbers and DNA Encoding
Submitted by grigby1 on Fri, 05/06/2022 - 10:34am
Protocols
quantum computing
DNA cryptography
DNA
Mathematics
resilience
Metrics
computer security
encoding
Qubit
Cryptography
privacy
network security
Resiliency
Human behavior
pubcrawl
information security
encryption
biblio
A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
Submitted by grigby1 on Fri, 05/06/2022 - 10:32am
resilience
secure authentication
key agreement
DNA cryptography
smart cards
mutual authentication
DNA
Mathematics
parallel processing
pubcrawl
Metrics
encoding
Protocols
privacy
authentication
Resiliency
Human behavior
biblio
The Impact of Sybil Attacks on Vehicular Fog Networks
Submitted by grigby1 on Wed, 03/23/2022 - 11:34am
Metrics
Vehicular fog computing
IoV
sybil attacks
Sybil attack
Fog computing
Mathematics
vehicular ad hoc networks
Time factors
Internet of Things
composability
privacy
Safety
Resiliency
resilience
pubcrawl
security
biblio
Statistical Randomness Tests of Long Sequences by Dynamic Partitioning
Submitted by grigby1 on Tue, 05/25/2021 - 3:21pm
Metrics
test suites
Scalability
Resilient
resilience
randomness
Random variables
random number
pubcrawl
NIST SP 800-22
NIST
collaboration
Mathematics
information security
Indexes
Human Factors
Human behavior
Generators
cryptology
Cryptography
composability
biblio
Penetration Testing Active Reconnaissance Phase – Optimized Port Scanning With Nmap Tool
Submitted by grigby1 on Fri, 05/22/2020 - 2:19pm
optimized port scanning
tools
telecommunication traffic
Task Analysis
scanning perimeter
Resiliency
resilience
Reconnaissance
pubcrawl
port scanning
passive scanning
passive information gathering techniques
active reconnaissance phase
nmap tool
network traffic
network accountability
Monitoring
Metrics
Mathematics
internet
footprinting
computer network security
composability
Bandwidth
biblio
Detection of False Data in Wireless Sensor Network Using Hash Chain
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
hash chain
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
sensor nodes
Resiliency
resilience
pubcrawl
Mathematics
Human behavior
Hostile Environment
authentication
False Data Injection
false data filtering schemes
False Data Detection
encryption
data integrity
cyber physical systems
Cryptography
composability
bogus data
Base stations
1
2
next ›
last »