Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Asymmetric Encryption
biblio
Implementation of Efficient Hybrid Encryption Technique
Submitted by grigby1 on Thu, 07/13/2023 - 12:46pm
composability
Asymmetric Encryption
efficient encryption
ECDH
symmetric encryption
Elliptic curves
ECC
Multimedia systems
Elliptic curve cryptography
encryption
Computational modeling
Protocols
authentication
AES
Resiliency
resilience
pubcrawl
biblio
Research and Application of Communication Security in Security and Stability Control System of Power Grid
Submitted by grigby1 on Fri, 03/17/2023 - 11:35am
Reliability engineering
random number
Asymmetric Encryption
key management
Asia
random key generation
Resiliency
communication security
Electrical Engineering
Focusing
pubcrawl
Stability analysis
security and stability control system
power system stability
resilience
control systems
Scalability
Metrics
Human Factors
Human behavior
biblio
New McEliece Cryptosystem Based on Polar-LDPC Concatenated Codes as a Post-quantum Cryptography
Submitted by grigby1 on Fri, 07/01/2022 - 8:29am
coding theory
Post-quantum resilience
McEliece Cryptosystem
LDPC codes
Asymmetric Encryption
codes
Resiliency
Resists
polar codes
security
parity check codes
Decoding
Metrics
Quantum mechanics
quantum computing
Computers
resilience
pubcrawl
biblio
Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems
Submitted by aekwall on Mon, 01/10/2022 - 12:48pm
Asymmetric Encryption
Compositionality
Resiliency
the 3rd Generation Partnership Project (3 GPP)
Subscription Permanent Identifier (SUPI)
Subscription Concealed Identifier (SUCI)
replay attack
home automation
guess attack
Elliptic Curve Integrated Encryption Scheme (ECIES)
security
Human behavior
Metrics
pubcrawl
Public key
Wireless communication
encryption
5G mobile communication
privacy
biblio
Blockchain-based Digital Locker using BigchainDB and InterPlanetary File System
Submitted by aekwall on Mon, 01/10/2022 - 12:48pm
IPFS
Compositionality
Resiliency
Immutable
File systems
decentralized
BigchainDB
Asymmetric
asset
Asymmetric Encryption
blockchain
blockchains
Prototypes
Receivers
Human behavior
Metrics
pubcrawl
encryption
information technology
Cloud Computing
biblio
Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing
Submitted by aekwall on Mon, 01/10/2022 - 12:47pm
Human behavior
Compositionality
Resiliency
Workload distribution
Proxy re-encryption
parallel computing
Big data sharing
Asymmetric Encryption
Load management
Task Analysis
Metrics
pubcrawl
Heuristic algorithms
Servers
Cloud Computing
Big Data
delays
biblio
Defense Against Frequency Analysis In Elliptic Curve Cryptography Using K-Means Clustering
Submitted by aekwall on Mon, 01/10/2022 - 12:47pm
Asymmetric Encryption
Compositionality
Resiliency
Plain Text
k-means clustering
Intelligent systems
frequency analysis
cipher text attack
cipher block chaining
encryption
Time-frequency Analysis
Ciphers
Elliptic curve cryptography
encoding
Human behavior
Metrics
pubcrawl
biblio
Application of Bio-inspired Algorithms to the Cryptanalysis of Asymmetric Ciphers on the Basis of Composite Number
Submitted by aekwall on Mon, 01/10/2022 - 12:47pm
RSA
Compositionality
Resiliency
quadratic sieve
integer factorization
Genetics
genetic algorithm
fitness function
bio-inspired algorithms
Asymmetric Encryption
Reliability
genetic algorithms
Prototypes
Approximation algorithms
Human behavior
Metrics
pubcrawl
Public key
encryption
biblio
Degree-sequence Homomorphisms For Homomorphic Encryption Of Information
Submitted by aekwall on Mon, 01/10/2022 - 12:46pm
Lattices
Compositionality
Resiliency
topological coding
public-key encryption
Homomorphic encryption
graph homomorphism
asymmetric encryption algorithm
Asymmetric Encryption
Controllability
automation
encoding
Human behavior
Metrics
pubcrawl
Public key
Conferences
biblio
Securely Distributing Files in Cloud Environment by Dispensing Asymmetric Key Management System applying Hashing
Submitted by aekwall on Mon, 01/10/2022 - 12:46pm
Software
Cloud Computing
encryption
Public key
pubcrawl
Metrics
Human behavior
Hash functions
data integrity
Asymmetric Encryption
Compression function
Data protection
security policies
Resiliency
Compositionality
1
2
3
4
5
6
7
next ›
last »