Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
RSA
biblio
Backchanneling Quantum Bit (Qubit) 'Shuffling': Quantum Bit (Qubit) 'Shuffling' as Added Security by Slipstreaming Q-Morse
Submitted by grigby1 on Fri, 11/03/2017 - 10:33am
random radicals
predicted-expected sender-receiver properties
pubcrawl
public key cryptography
Quantum bit (Qubit)
quantum computing
quantum cryptography
quantum cyphers
Quantum entanglement
Morse
Resiliency
Rivest-Shamir-Adleman
RSA
Scalability
sensors
Shuffling
slipstreaming Q-Morse code
containment wave
backchanneling qubit shuffling
Backchannelling
backchannelling quantum Morse code
blockchain ledger history
blockchain security
Ciphers
codes
communication security
backchanneling quantum bit shuffling
Cypher
digital signature algorithm
DSA
ECDSA
elliptic curve digital signature algorithm
Entanglement
Internet of Things
biblio
Automated Verification in Cryptography System
Submitted by grigby1 on Tue, 09/26/2017 - 11:32am
3DES
collaboration
Compositionality
CRAM-MD5
E-Voting Protocol
HMAC-MD5
Multiphase Encryption
Multiple Encryption
privacy
protocol verification
pubcrawl
RSA
UID
biblio
Advances In Distributed Security For Mobile Ad Hoc Networks
Submitted by grigby1 on Mon, 03/20/2017 - 9:12am
Ad hoc networks
AES
Attribute authority
attribution
certificate
composability
Cryptography
firewall
Human behavior
MANET security
Metrics
mobile ad hoc network
pubcrawl
public key infrastructure
RSA
biblio
Designing a database encryption technique for database security solution with cache
Submitted by grigby1 on Wed, 03/08/2017 - 1:24pm
Elliptic curves
database management software
database management systems
database security solution
Databases
DBMS
Decision Making
Elliptic curve cryptography
Elliptic Curve Cryptography(ECC)
database encryption technique
elliptical curve cryptography module
encryption
financial information
personal files
pubcrawl170112
public key cryptography
RSA
supply chain management
Data collection
cache storage
client details
company secrets
computer architecture
corporate data
corrupted data
customer service management
data availability
Advanced Encryption Standard(AES)
data consistency
data integrity
data loss
data management
data organization
data quality
data retrieval
database cache
biblio
"Improved Detection of 1-2-4 LSB Steganography and RSA Cryptography in Color and Grayscale Images"
Submitted by grigby1 on Thu, 02/23/2017 - 11:36am
image colour analysis
Steganography
security
RSA cryptography
RSA
public key cryptography
pubcrawl170105
pubcrawl
privacy
LSB
Image edge detection
1-2-4 LSB steganography
Image color analysis
hidden knowledge
grayscale images
Gray-scale
encryption
data privacy
Cryptography
color images
Color
biblio
Efficient modular multiplication algorithms for public key cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:07am
modular exponentiation
word length
substitute and reward algorithms
store and forward algorithms
RSA
public key cryptosystems
Public key cryptography(PKC)
public key cryptography
modular multiplication algorithms
Modular Multiplication
Algorithm design and analysis
encryption
digital signatures
digital signature schemes
cryptographic transformations
Conferences
Ciphers
bit forwarding algorithms
binary exponentiation
BFW algorithms
biblio
COALA - System for Visual Representation of Cryptography Algorithms
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
RSA algorithm
Diffie-Hellman
Diffie-Hellman algorithm
educational courses
Educational institutions
educational software systems
engineering sciences
further education
RSA
DES algorithm
School of Electrical Engineering
security education
Software algorithms
student attitudes
student knowledge acquisition
University of Belgrade
visualization
AES
DES
Data visualization
data visualisation
data security course
Data Security
cryptography algorithms
Cryptography
cryptographic algorithms
cryptographic algorithm visual representation
computer science education
computer aided instruction
COALA system
algorithm visualization
Algorithm design and analysis
AES algorithm
« first
‹ previous
1
2
3
4
5
6