Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptography algorithms
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 2:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
biblio
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-Type Groups
Submitted by grigby1 on Mon, 12/30/2019 - 1:18pm
noncyclic groups
statistical parameter
single malicious server
server computation
secure outsourcing
secure delegation
Scalability
RSA-based group cryptosystems
RSA
Resiliency
public-key cryptosystems
public key cryptography
pubcrawl
probability
cloud computing application scenarios
modular exponentiations
group theory
group exponentiation
fixed-exponent exponentiation
exponentiation
discrete logarithm problem
delegation protocol
cyclic groups
cryptography algorithms
Cryptography
Cryptographic Protocols
cloud server computation
biblio
Performance Evaluation on IoT Devices Secure Data Delivery Processes
Submitted by aekwall on Wed, 05/01/2019 - 11:42am
performance evaluation
IoT protocols
cryptography algorithms
Metrics
composability
pubcrawl
Resiliency
network security
information security
embedded systems
Data Security
biblio
Generated Un-detectability Covert Channel Algorithm for Dynamic Secure Communication Using Encryption and Authentication
Submitted by grigby1 on Tue, 12/12/2017 - 12:28pm
fake key
un-detectability
telecommunication security
telecommunication channels
Servers
Scalability
Resiliency
pubcrawl
Protocols
message authentication
Heuristic algorithms
hashed message authentication code
generated un-detectability covert channel algorithm
advanced encryption standard
encryption
dynamically
dynamic secure communication
cryptography algorithms
Cryptography
covert channels
covert channel
confidentiality
Compositionality
authentication
Algorithm
biblio
COALA - System for Visual Representation of Cryptography Algorithms
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
RSA algorithm
Diffie-Hellman
Diffie-Hellman algorithm
educational courses
Educational institutions
educational software systems
engineering sciences
further education
RSA
DES algorithm
School of Electrical Engineering
security education
Software algorithms
student attitudes
student knowledge acquisition
University of Belgrade
visualization
AES
DES
Data visualization
data visualisation
data security course
Data Security
cryptography algorithms
Cryptography
cryptographic algorithms
cryptographic algorithm visual representation
computer science education
computer aided instruction
COALA system
algorithm visualization
Algorithm design and analysis
AES algorithm