Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Asymmetric Encryption
biblio
Hybrid Encryption Algorithm Based on Wireless Sensor Networks
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Compositionality
wireless sensor networks(WSNs)
hybrid encryption algorithm
encryption standard
data compression technology
cipher block
asymmetric/symmetric encryption algorithm
Asymmetric Encryption
elliptic curve encryption
AES
advanced encryption standard
ECC
public key cryptography
data compression
Metrics
wireless sensor networks
pubcrawl
Human behavior
Resiliency
private key cryptography
biblio
Research on Point-To-Point Encryption Method of Power System Communication Data Based on Block Chain Technology
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
asymmetric key encryption
transfer key
public key distribution scheme
power system communication data
point-to-point encryption method
point-to-point encryption
encryption identifier
Design Method
data block
communication data point
communication data encryption methods
communication data content
communication data
block chain technology
encryption
Asymmetric Encryption
Compositionality
power systems
power system stability
blockchain technology
public key cryptography
Public key
Distributed databases
Metrics
pubcrawl
Human behavior
Resiliency
Receivers
biblio
Collaborative KP-ABE for cloud-based Internet of Things applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
Internet of Things
Trusted Computing
trusted assistant nodes
storage management
storage capacities
Servers
sensors
security scheme
Scalability
resource-limited networks
pubcrawl
policy-based governance
Performance analysis
KP-ABE
key-policy attribute-based encryption
key policy attribute based encryption
Access Control
encryption
Cryptography
cryptographic scheme
computer network security
collaborative KP-ABE
collaboration
cloud-based IoT applications
cloud-based Internet of Things applications
cloud servers
cloud resources
Cloud Computing
C-KP-ABE
authorisation
Asymmetric Encryption
access control solutions
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
man-in-the-middle
weak point
update package encryption process
update
target hardware
symmetric encryption algorithms
symmetric encryption
specific encryption algorithms
secure update process
secure firmware update
safety critical operations
potential attackers
man-in-the-middle attacks
great numbers
asymmetric encryption algorithms
Asymmetric Encryption
security
Hash functions
intellectual property
confidentiality
authenticity
Embedded System
firmware
Metrics
composability
pubcrawl
Resiliency
embedded devices
embedded systems
telecommunication security
Cryptography
biblio
Research on Traceability Algorithm of Logistics Service Transaction Based on Blockchain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
Logistics
Traceability algorithm
supply chains
supply chain security
supervision system
Stakeholders
Scalability
Resiliency
resilience
pubcrawl
multidimensional traceable data model
logistics service supply chain
Globe sandara 1
Human behavior
Globe standara 1
agricultural products
Asymmetric Encryption
blockchain
blockchain-based logistics service transaction traceability algorithm
business process
cryptocurrencies
Data Security
Distributed databases
biblio
An Improved Asymmetric Key Based Security Architecture for WSN
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Metrics
WSN
wireless sensor networks
wireless sensor networking
Wireless communication
ubiquitous healthcare system
security of data
Resiliency
resilience
public key cryptography
Pseudo inverse matrix.
PKC
PEKS-PM
password
pubcrawl
Human behavior
encryption
data transfers
Cryptography
computer architecture
Compositionality
composability
authentication
asymmetric key based security architecture
Asymmetric Encryption
asymmetric based scheme
AKA
biblio
Performance Analysis of Elliptic Curves for Real-Time Video Encryption
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Jitter
Streaming media
security
Resiliency
resilience
Real-time video streaming
real-time systems
pubcrawl
Metrics
Asymmetric Encryption
Human behavior
encryption
Elliptic curve cryptography
ECC
delays
Compositionality
composability
biblio
A Proposed Serpent-Elliptic Hybrid Cryptosystem For Multimedia Protection
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
image encryption
symmetric encryption scheme
statistical attack
serpent-elliptic hybrid cryptosystem
Serpent algorithm
SERPENT
Resiliency
resilience
public key cryptography
pubcrawl
Multimedia systems
multimedia protection
Metrics
insecure networks
insecure channel
information security
Asymmetric Encryption
hybrid cryptosystem
Human behavior
encryption quality
encryption
Elliptic curves
Elliptic curve cryptography
differential attack
data encapsulation scheme
data encapsulation
Correlation
Compositionality
composability
asymmetric schemes key distribution
asymmetric encryption scheme
biblio
Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Resiliency
Human behavior
information
information and communication systems
Metrics
pubcrawl
Public key
public key cryptography
public key cryptography system
resilience
encryption process
Rivest
RSA
RSA 1024
RSA algorithm
RSA encryption
Scalability
security
security system analysis
Shamir
digital signature
Asymmetric Encryption
asymmetric keys
authentication
combination method
Communication networks
composability
Compositionality
Data Security
decryption process
and Adleman algorithm
digital signatures
digital signature algorithm
Digital Signature Standard
DSA
DSA 512
DSA algorithms
DSS
encryption
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »