Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RSA
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:33am
RSA
work flow
Terminology
public key cryptosystems
public key cryptosystem
Pailier
in-direct rapid homomorphic encryption
homomorphic encryption schemes
homomorphic cryptosystem
ElGamal based algebric homomorphic encryption
crypto-algorithms
Brakerski-Gentry-Vaikuntanathan model
Application of Homomorphic Encryption
Homomorphic encryption
Fog computing
Human Factors
Cloud Computing
edge computing
security threats
False Data Injection
public key cryptography
Data protection
Metrics
privacy
pubcrawl
Resiliency
data encryption
data integrity
encryption
Data Security
Servers
Scalability
biblio
Ensuring Cybersecurity of Data Transmission in Limited Energy Consumption Networks
Submitted by grigby1 on Thu, 01/28/2021 - 1:33pm
pubcrawl
wireless transmission
Temperature measurement
Software algorithms
Software
smart phones
Scalability
RSA
Resiliency
resilience
android encryption
Metrics
Human behavior
Energy Efficiency
encryption
Diffie-Hellman algorithm
Cybersecurity
computer security
Complexity theory
asymmetric encryption/decryption algorithm
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 12:08pm
key-encryption key
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
Cache-as-RAM
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
Computers
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Internet of Things
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
biblio
A Digital Signature System Based on Real Time Face Recognition
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
biometric encryption
digital signature
face recognition
LBPH
Metrics
pubcrawl
resilience
Resiliency
RSA
Scalability
SHA256
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
biblio
A Secure QR Code System for Sharing Personal Confidential Information
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
Cryptography
cyber physical systems
decryption
encryption
pubcrawl
QR codes
Quick Response (QR) Code
Resiliency
RSA
Secure QR Code (SQRC)
Validation.
verification
biblio
A New Approach to Security of N TP via SSL Certificates
Submitted by grigby1 on Mon, 02/10/2020 - 11:30am
ECDSA
Human behavior
Human Factors
Metrics
mtim
NTP
ntp protocol attacks
pubcrawl
resilience
Resiliency
RSA
Scalability
SSL
SSL Trust Models
biblio
Side-Channel Timing Attack of RSA on a GPU
Submitted by grigby1 on Tue, 01/21/2020 - 11:50am
exponentiation
gpu
pubcrawl
resilience
Resiliency
RSA
Scalability
Timing attack
biblio
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness
Submitted by aekwall on Mon, 01/20/2020 - 11:48am
public key cryptography
Stochastic processes
stochastic method
stochastic heuristic approach
Side-channel attack
security effectiveness
Scalability
SCA
RSA cryptosystem
RSA
Resiliency
public-key cryptosystem
public-key cryptography
ACP
pubcrawl
PKC
multiplication-squaring operations
modular exponentiation
microsoft windows
Heuristic algorithms
exponentiation operation
exponentiation
dummy operations
Benchmark testing
addition chain problem
biblio
On the Security of the PKCS\#1 V1.5 Signature Scheme
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
Scalability
Resiliency
pubcrawl
standards
digital signatures
RSA
lossiness
PKCS
security reduction
« first
‹ previous
1
2
3
4
5
6
next ›
last »