Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
private key
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 12:08pm
key-encryption key
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
Cache-as-RAM
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
Computers
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Internet of Things
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
biblio
Mobile Ad Hoc Network for Security Enhancement
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
MANET
telecommunication security
security enhancement
Secure Hashing Algorithm
Routing protocols
Resiliency
reactive method
Public key
proactive method
private key
mobile ad hoc networks
mobile ad hoc network
Metrics
Message Digest 5
pubcrawl
identification process
hackers node
game theory
game theoretical approach
encryption
decryption processes
Cryptography
Compositionality
AODV
advanced encryption standard
ad hoc on-demand distance vector routing protocol
Ad Hoc Network Security
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
smart home service
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
Receivers
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
asymmetric encryption key
public key cryptography
Public key
pubcrawl
private key
performance enhancement
optimal key length
Metrics
mean square error methods
key length
intrusion
home computing
free-space optical communication
encryption
Correlation
asymmetric Rivest-Shamir-Adleman encryption method
biblio
Malsign: Threat Analysis of Signed and Implicitly Trusted Malicious Code
Submitted by grigby1 on Wed, 05/30/2018 - 3:55pm
PKCS
trusted software providers
Trusted Computing
threat analysis
targeted attacks
signing keys
signed malware
signed code
Servers
Scalability
Resiliency
pubcrawl
private key cryptography
private key
PKI Trust Models
PKI
benign software
Metrics
malware
Malsign
malicious code signing
invasive software
implicitly trusted malicious code
Human Factors
Human behavior
genuine software
digital signatures
Computer crime
Companies
code signing infrastructure
code signing
Browsers
biblio
Have the security flaws surrounding BITCOIN effected the currency's value?
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
Scalability
Human Factors
market value
Online banking
peer to peer transactions
Peer-to-peer computing
private key
Protocols
pubcrawl
human factor
security breech
security flaws
security of data
statistical analysis
statistical data analysis
transaction processing
volatile currency
data analysis
Bitcoin protocol
bitcoin security
Bitcoin services
blockchain
Companies
complex public address
Crypto Currency Digital Security
currency value
bitcoin
decentralized virtual currency
digital currency
digital security environment
electronic money
financial data processing
Fluctuations
Human behavior
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
Radio frequency
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
matrix algebra
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
Algorithm design and analysis
key generation process
Human Factors
Human behavior
Galois fields
finite field
Ergodic Matrix
EPC code
encryption process
encryption
Databases
counterfeit
BMQE system
BMQ polynomials
bisectional multivariate quadratic equation system
anticounterfeit scheme
biblio
"HRJ_encryption: An ASCII code based encryption algorithm and its implementation"
Submitted by grigby1 on Tue, 02/14/2017 - 12:10pm
information technology
Secret key
Receivers
public key cryptography
Public key
pubcrawl170102
private key cryptography
private key
Plain Text
personal desktop
Algorithm design and analysis
HRJ_encryption
encryption
decryption
Cloud Computing
cipher text
ASCII code based encryption algorithm
ASCII Code
arrays
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization