Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic algorithm
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 11:03am
log management
whitelist-based security protection
whitelist management
trusted computing technology
Trusted Computing
transport protocols
TCPIP
TCP/IP protocol
security policy management
security management system
security management
Resiliency
resilience
Qt graphical management interface
pubcrawl
Metrics
composability
Kernel
IoT devices
Internet of Things development
Internet of Things
graphical management interface
embedded systems
embedded system security protection
embedded security protection system
Cryptography
cryptographic algorithm
Computers
computer network security
computer network reliability
computer network performance evaluation
computer network management
biblio
Design and Implementation of DNA Based Cryptographic Algorithm
Submitted by aekwall on Mon, 02/08/2021 - 12:50pm
S-box
pipeline processing
half cryptographic framework
DNA based S-box
DNA based cryptographic algorithm
current security
Circuits and systems
Artix-7 device
AES-Algorithm
biocomputing
DNA cryptography
security
cryptographic algorithm
Predictive Metrics
DNA
privacy
standards
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
biblio
The Design of S-box Based on Combined Chaotic Map
Submitted by aekwall on Mon, 01/18/2021 - 10:23am
S-box
substitution box
S-box construction method
one-dimension chaotic map
nonlinear component
logistic map
lightweight block cipher
combined chaotic map
sine map
Scalability
cryptographic algorithm
chaotic cryptography
chaos
probability
Metrics
pubcrawl
Resiliency
Cryptography
biblio
A Novel Encryption Algorithm based on DNA Cryptography
Submitted by aekwall on Mon, 06/22/2020 - 10:27am
encoding
plain-text
DNA symmetric cryptography
DNA computing
biocomputing
DNA cryptography
confidential data
encryption algorithm
cryptographic algorithm
encryption process
Cryptography
Predictive Metrics
Ciphers
DNA
privacy
pubcrawl
Human behavior
Resiliency
information security
encryption
biblio
Analyzing the Browser Security Warnings on HTTPS Errors
Submitted by grigby1 on Fri, 04/17/2020 - 9:45am
Error analysis
Resistance
browser behaviors
browser defects
browser security warnings
certificate verification
certification
common HTTPS errors
cryptographic algorithm
Compositionality
HPKP
HSTS
name validation
Phase change materials
secure connections
secure Web applications
valid certificate chain
Web Browser Security
internet
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data confidentiality
telecommunication security
data privacy
Cryptography
composability
encoding
programming
online front-ends
error correction codes
Metrics
Reliability
biblio
A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
key generation
random key generation
session key generation
repeated random numbers
randomized numbers
random sequence
pseudorandom number generator algorithm
Pseudo-Random Numbers
PRNG seed
PRNG
NIST Test Suite
Linear Congruential Generator algorithm
Linear Congruential Generator
LCG algorithm
Scalability
entropy source epoch timestamp
Random sequences
Authentication schemes
cryptographic algorithm
random number generation
Entropy
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
New Approach to Secure Cluster Heads in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
inter-cluster communication
cluster head
resource constraints
Aggregation
Cluster.
cryptographic algorithm
genetic algorithm based search
Head
hierarchical architecture security
malicious attacks
intra-cluster communication
multihop approach
node failure probability
overhead communication
overhead computation
secured WSN deployment
wireless links
Wireless Sensor Network
Metrics
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
sensor nodes
Monitoring
Clustering algorithms
probability
genetic algorithms
security threats
sensor security
Topology
data aggregation
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 11:07am
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
biblio
An Efficient Reconfigurable Ring Oscillator for Hardware Trojan Detection
Submitted by grigby1 on Fri, 10/27/2017 - 11:23am
AES
composability
cryptographic algorithm
FPGA
Hardware Trojan Horse
pubcrawl
Resiliency
Ring Oscillator
trojan horse detection
biblio
Developing a cryptographic algorithm based on ASCII conversions and a cyclic mathematical function
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
data encryption
unprintable text
unprintable encrypted message
matrix algebra
information security
Informatics
Higher Level of Security
Encryption and Decryption
encryption
encoding
Algorithm design and analysis
data decryption
cyclic mathematical function
Cryptography
cryptographic algorithm
computer science
binary matrices
ASCII value
ASCII conversions
ASCII Conversion