Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RSA
biblio
Fast Modular Exponentiation Methods for Public-Key Cryptography
Submitted by grigby1 on Tue, 07/18/2023 - 3:21pm
Raspberry Pi
window method (WM)
public-key cryptosystem (PKC)
Modular exponentiation (ME)
exponentiation
Human Factors
Resiliency
Communications technology
RSA
security
public key cryptography
energy consumption
Complexity theory
Task Analysis
Java
Scalability
resilience
pubcrawl
biblio
Node Protection using Hiding Identity for IPv6 Based Network
Submitted by grigby1 on Fri, 02/24/2023 - 5:31pm
Policy Based Governance
SHA2
OPNET
IP spoofing
logistic map
RSA
Steganography
Power demand
IPv6
traffic control
Receivers
collaboration
network security
Memory management
composability
Computational modeling
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Fuzzy AHP based Ranking of Cryptography Indicators
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
Telecommunications
Fuzzy Cryptography
Quantum encryption
Multi-criteria decision-making
FAHP
Costs
Resiliency
analytic hierarchy process
RSA
encryption
Robustness
Artificial Intelligence
Scalability
AES
Hardware
resilience
Metrics
pubcrawl
biblio
Applied Cryptography in Network Systems Security for Cyberattack Prevention
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Applied cryptography
Cryptography
encryption
fabrication
Hash functions
Interception
Interruption
modification
network security
pubcrawl
Public key
resilience
Resiliency
RSA
Trustworthy Systems
Virtual private networks
biblio
Asymmetric Encryption of Surveillance Videos for Adaptive Threshold based Moving Object Detection
Submitted by grigby1 on Tue, 05/10/2022 - 3:32pm
adaptive thresholding
Conferences
encryption
Human behavior
key generation
Metrics
object detection
pubcrawl
real-time systems
resilience
Resiliency
RSA
Streaming media
Video Segmentation
video surveillance
biblio
Secure Cloud Data Deduplication with Efficient Re-Encryption
Submitted by grigby1 on Mon, 05/09/2022 - 4:37pm
Public key
REED
data deduplication
AONT
user privacy in the cloud
RSA
Scalability
cloud
Metals
computer architecture
Redundancy
Access Control
data privacy
Resiliency
resilience
pubcrawl
Cloud Computing
encryption
biblio
An Hybrid Approach to Insure Data Integrity on Outsourced Data using Symmetric Key Cryptography
Submitted by aekwall on Fri, 05/06/2022 - 12:52pm
AES
encryption audits
outsourcing
hybrid encryption
DES
auditing
RSA
data integrity
Cryptography
Predictive Metrics
Reliability
Compositionality
Technological innovation
Resiliency
pubcrawl
encryption
Protocols
data privacy
Cloud Computing
biblio
Comparison of ECC and RSA Algorithm with DNA Encoding for IoT Security
Submitted by grigby1 on Fri, 05/06/2022 - 10:32am
encoding
DNA Sequencing
Pragmatics
DNA cryptography
RSA
DNA
ECC
resilience
Elliptic curve cryptography
Metrics
encryption
standards
Cryptography
privacy
Safety
Resiliency
Human behavior
pubcrawl
IoT
biblio
An Efficient Color Image Security Technique for IOT using Fast RSA Encryption Technique
Submitted by grigby1 on Thu, 05/05/2022 - 3:12pm
IoT
efficient encryption
Secure Force (SF)
Keywords Color Image encryption
Histogram
cyber physical system security framework
filtering algorithms
cyber physical systems
RSA
Color
Image color analysis
security
visualization
Force
Robustness
composability
Entropy
Cryptography
Resiliency
resilience
pubcrawl
biblio
Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm
Submitted by grigby1 on Tue, 02/22/2022 - 1:25pm
Metrics
Stakeholders
signature
Scalability
RSA
Resiliency
resilience
pubcrawl
privacy
peer-to-peer security
Peer-to-peer computing
peer to peer security
IoTBC
Internet of Things
Intelligent systems
Human Factors
Hash Function
Elliptic curve cryptography
ECDSA
ECC
digital
blockchain
1
2
3
4
5
6
next ›
last »