Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Diffie-Hellman algorithm
biblio
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Submitted by grigby1 on Thu, 01/28/2021 - 12:33pm
pubcrawl
wireless transmission
Temperature measurement
Software algorithms
Software
smart phones
Scalability
RSA
Resiliency
resilience
android encryption
Metrics
Human behavior
Energy Efficiency
encryption
Diffie-Hellman algorithm
Cybersecurity
computer security
Complexity theory
asymmetric encryption/decryption algorithm
biblio
Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 10:23am
Hybrid Security Method
AODV protocol
AOMDV
AOMDV protocol
AOMDV routing protocol
appropriate routes
Diffie-Hellman algorithm
Diffie-Hellman key exchange algorithm
Distance vector routing protocols
ad hoc network
Normalized Routing Load
on-demand routing protocols
SHA-3 algorithm
single route discovery
useful internet protocol
wireless ad hoc networks
MANET Attack Detection
message passing
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
Routing
computer science
Routing protocols
security
Compositionality
AODV
Black hole attack
MANET
mobile ad hoc networks
detection
mobile ad hoc network
biblio
Secure object tracking protocol for Networked RFID Systems
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
security
protocol
Protocols
pubcrawl170112
PUF
radiofrequency identification
radiofrequency identification technology
RFID
secure object tracking protocol
privacy
security protocol description language
SPDL model
supply chains
telecommunication security
tracker
unclonable
visibility
networked RFID system
cryptographic primitive
Cryptographic Protocols
Diffie-Hellman algorithm
distributed system
injection of fake objects
IoT
lawful business operation
Mathematical model
automated claim verification tool Scyther
non-repudiation
NRS
NRS system security
object traceability
object tracking
object visibility
physically unclonable function
biblio
COALA - System for Visual Representation of Cryptography Algorithms
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
RSA algorithm
Diffie-Hellman
Diffie-Hellman algorithm
educational courses
Educational institutions
educational software systems
engineering sciences
further education
RSA
DES algorithm
School of Electrical Engineering
security education
Software algorithms
student attitudes
student knowledge acquisition
University of Belgrade
visualization
AES
DES
Data visualization
data visualisation
data security course
Data Security
cryptography algorithms
Cryptography
cryptographic algorithms
cryptographic algorithm visual representation
computer science education
computer aided instruction
COALA system
algorithm visualization
Algorithm design and analysis
AES algorithm