Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Elliptic curves
biblio
A new multi-proxy multi-signature scheme based on elliptic curve cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:24pm
computer science
Conferences
digital signatures
Elliptic curve cryptography
Elliptic curves
Metrics
multi-proxy
multi-signature
pubcrawl
Resiliency
Scalability
biblio
Fault attack for scalar multiplication over finite field (E(Fq)) on Elliptic Curve Digital Signature Algorithm
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
finite field
vigilant periodic sequence algorithm
software reliability
software fault tolerance
security perspectives
scalar multiplication algorithm
scalar multiplication
Resiliency
public key cryptography
pubcrawl
physical attacks
Metrics
Algorithm design and analysis
fault injection attack
Fault Attacks
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECDSA
digital signatures
composability
Circuit faults
biblio
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
Homomorphic encryption
user privacy data protection
TTP
trusted third party
semantic security
secure multiparty computation
Resiliency
public key cryptography
public environments
pubcrawl
privacy protection
plain text attack
Metrics
homomorphic encryption scheme
Cloud Computing
GPS data of the earthquake
GPS data
encryption
encrypted outsourcing data
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Data Security
data privacy
compute complexity
composability
Cloud Security
biblio
A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
hardware resources
Software algorithms
Resiliency
public-key cryptosystems
public-key cryptography schemes
public key cryptography
pubcrawl
prime fields
point multiplication
optimization
Metrics
Instruction sets
Instruction Set Architecture
Algorithm design and analysis
FPGA
field-programmable gate array platform
field programmable gate arrays
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC-ASIP model
ECC custom instructions
custom instruction set
composability
code storage space
application specific instruction set processor
biblio
Key Compression for Isogeny-Based Cryptosystems
Submitted by grigby1 on Mon, 05/22/2017 - 1:55pm
composability
Elliptic curves
isogenies
key compression
Metrics
Post-quantum cryptography
pubcrawl
quantum computing security
Resiliency
biblio
Designing a database encryption technique for database security solution with cache
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
Elliptic curves
database management software
database management systems
database security solution
Databases
DBMS
Decision Making
Elliptic curve cryptography
Elliptic Curve Cryptography(ECC)
database encryption technique
elliptical curve cryptography module
encryption
financial information
personal files
pubcrawl170112
public key cryptography
RSA
supply chain management
Data collection
cache storage
client details
company secrets
computer architecture
corporate data
corrupted data
customer service management
data availability
Advanced Encryption Standard(AES)
data consistency
data integrity
data loss
data management
data organization
data quality
data retrieval
database cache
biblio
"A project-based multi-disciplinary elective on digital data processing techniques"
Submitted by grigby1 on Tue, 02/14/2017 - 12:43pm
Elliptic curves
undergraduate majors
students feedback
source coding
registration statistics
pubcrawl170102
project-based multidisciplinary elective
project based
polynomials
multi-disciplinary
Internet-of-Things
Image coding
fresh graduates
error correcting codes
encryption
assessment data
Electrical Engineering
educational courses
digital data processing techniques
Data processing
data handling
Cryptography
course outcomes
computer science
Computer Engineering
computer aided instruction
Compression
Cloud Computing
channel coding
Big Data centers
biblio
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system
Submitted by BrandonB on Wed, 05/06/2015 - 1:45pm
medical information systems
wireless sensor networks
Wireless body area networks
WBAN
sensors
secure key management scheme
secure communication
public key cryptography
patient medical information protection
message authentication
Medical services
authenticated message exchange
key management
healthcare system
healthcare security
health care
Elliptic curves
Elliptic curve cryptography
ECC algorithm
body area sensor network security
body area networks
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 10:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme
« first
‹ previous
1
2
3
4
5
6
7
8