Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AES algorithm
biblio
Enhancing Cloud Data Privacy Using Pre-Internet Data Encryption
Submitted by grigby1 on Mon, 05/09/2022 - 4:35pm
encryption
Cloud Computing
pubcrawl
resilience
Resiliency
AES algorithm
data privacy
Cloud Security
Libraries
Scalability
information processing
Media
user privacy in the cloud
Costs
client-side encryption
biblio
Use of AES Algorithm in Development of SMS Application on Android Platform
Submitted by grigby1 on Mon, 01/10/2022 - 12:15pm
Metrics
symmetric encryption
SMS application
Scalability
Resiliency
resilience
Reliability
pubcrawl
optimization
AES algorithm
Message service
Market research
Internet telephony
Human behavior
Freeware
encryption
android encryption
biblio
Mitigating DDoS Flooding Attacks with Dynamic Path Identifiers in Wireless Network
Submitted by aekwall on Mon, 05/03/2021 - 1:11pm
DoS
Router Systems Security
Wireless Routing
Dynamic Path Identifiers (DPID)
AES algorithm
decryption
OTP
wireless networks
Predictive Metrics
Computer crime
Wireless communication
Communication system security
Routing
pubcrawl
Resiliency
encryption
Servers
IP networks
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
Improvement of PRIME Protocol Based on Chaotic Cryptography
Submitted by grigby1 on Fri, 01/22/2021 - 1:51pm
AES algorithm
AES encryption algorithm
carrier transmission on power lines
chaotic cryptography
Chebyshev approximation
Cryptographic Protocols
encryption
key expansion process
narrowband power line communication protocol
Power line communications
PRIME protocol
Protocols
pubcrawl
biblio
Improvement of PRIME Protocol Based on Chaotic Cryptography
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
encryption
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
composability
Predictive Metrics
chaotic cryptography
AES algorithm
carrier transmission on power lines
Power line communications
AES encryption algorithm
Chebyshev approximation
key expansion process
narrowband power line communication protocol
PRIME protocol
biblio
A Multiple Layer Security Scheme Utilizing Information Matrices
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
secret data
word length 256 bit
secret message
multiple layer security scheme
least significant bit embedding
information matrix
information matrices
double-layer message security scheme
Steganography
Cryptography
AES algorithm
QR codes
cyber physical systems
matrix algebra
pubcrawl
Resiliency
telecommunication security
biblio
Smart and Secure Group Communication in Iot Using Exponential Based Self Healing Group Key Distribution Protocol
Submitted by grigby1 on Mon, 02/17/2020 - 5:12pm
AES algorithm
composability
Polynomial Factorization
pubcrawl
resilience
Resiliency
Self-healing Group Key Distribution
self-healing networks
wireless network
biblio
A Cyber Communication Package in the Application of Grid Tied Solar System
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
Rivest
internet
internet connected computers
latency reduction
Load modeling
Metrics
power engineering computing
power grids
power system security
pubcrawl
resilience
Resiliency
Human Factors
RSA algorithms
Scalability
secured socket layer
secured socket layer (SSL)
Servers
Shamir and Adleman (RSA)
Shamir and Adleman algorithms
Solar system
SSL
SSL Trust Models
Cryptography
advanced encryption standard (AES)
AES algorithm
bidirectional communication strategy
communication concept
communication methodology
communication process
communication program
Computational modeling
Computer crime
Computers
advanced encryption standard
cyber communication package
cyber network
cyber security
cyber security arrangement
data exchange
electrical data
electronic data interchange
grid connected solar system
grid tied solar system
Human behavior
biblio
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
side channel analysis attacks
narrow bandpass filtering
optimal leakage models
parallel round-based datapath
PRINCE
pubcrawl
Resiliency
resource constraints
round unrolled implementations
round unrolling
Scalability
side channel analysis
multiband narrow bandpass filtering techniques
side channel signatures
side-channel leakage
signal isolation
Signal to noise ratio
signal-to-noise ratio
SIMON
SIMON datapaths
size 45.0 nm
SNR
time domain correlation power analysis
Energy Efficiency
AES
AES algorithm
Band-pass filters
Ciphers
combinational logics
Correlation
correlation frequency analysis
Cryptography
edge nodes
encryption
advanced encryption standard
field programmable gate arrays
Filtering
first-order side-channel leakages
FPGA
fully-unrolled datapath
Hardware
improved CFA attack
leakage models
Lightweight Ciphers
lightweight cryptographic algorithms
1
2
next ›
last »