Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Asymmetric Encryption
biblio
Post-Quantum Algorithm of Asymmetric Encryption and Its Basic Properties
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Metrics
ring
Resiliency
resilience
quotient ring
quantum cryptography
quantum computing
Public key
post-quantum algorithm
polynomial
NTRU-like cryptosystem NTRU Prime IIT Ukraine
NIST
pubcrawl
Human behavior
field
end-to-end encryption type
encryption
encoding
cryptographic transformations
Computers
Compositionality
composability
basic properties
Asymmetric Encryption
biblio
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption
Submitted by grigby1 on Fri, 02/08/2019 - 4:20pm
pubcrawl
Asymmetric Encryption
attribute-based encryption
composability
Compositionality
cross-system
Human behavior
Metrics
pair encoding
Proxy re-encryption
publickey encryption
resilience
Resiliency
biblio
Multi-Bit Leveled Homomorphic Encryption of Message Matrices
Submitted by grigby1 on Fri, 02/08/2019 - 4:20pm
Asymmetric Encryption
Cloud Computing
composability
Compositionality
fully homomorphic encryption
Homomorphic encryption
Human behavior
Human Factors
Metrics
Multi-bit encryption
privacy protection
pubcrawl
resilience
Resiliency
Scalability
biblio
Marble: Making Fully Homomorphic Encryption Accessible to All
Submitted by grigby1 on Fri, 02/08/2019 - 4:20pm
Asymmetric Encryption
composability
Compositionality
encrypted applications
encryption audits
homomorphic encryption schemes
Human behavior
Metrics
pubcrawl
resilience
Resiliency
biblio
Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman
Submitted by grigby1 on Fri, 02/08/2019 - 4:20pm
pubcrawl
Asymmetric Encryption
composability
Compositionality
DH
ECC
ECDH
Human behavior
Metrics
resilience
Resiliency
robotic surgery
biblio
SHARVOT: Secret SHARe-Based VOTing on the Blockchain
Submitted by grigby1 on Fri, 02/08/2019 - 4:20pm
pubcrawl
Asymmetric Encryption
blockchain network
composability
Compositionality
Human behavior
Metrics
resilience
Resiliency
secret sharing
voting
biblio
A DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
finite values
fixed sized chunk
Human behavior
Metrics
Paillier
Paillier cryptosystems
plaintext
pubcrawl
equivalent binary value
random processes
random strings
Receivers
resilience
Resiliency
RSA
Transforms
asymmetric cryptosystem
equivalent ASCII values
encryption
encoding
ElGamal cryptosystems
ElGamal
dynamic DNA encoding
DNA cryptography
DNA cryptographic technique
DNA bases
DNA
data secrecy
Compositionality
Ciphertext
biocomputing
Asymmetric Encryption
biblio
Towards Lightweight Identity-Based Encryption for the Post-Quantum-Secure Internet of Things
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
key discovery procedure
word length 80 bit
time 36 ms
time 103 ms
RLWE problem
Resiliency
resilience
reconfigurable hardware component
quantum cryptography
pubcrawl
post-quantum-secure Internet of Things
multiuser scenarios
microcontrollers
Metrics
low-cost ARM Cortex-M0 microcontroller
lightweight identity-based encryption
ad-hoc network connection
Internet of Things
internet
Identity-based encryption
IBE scheme
Human behavior
encryption
embedded device
decryption
data exchange security
computer network security
Compositionality
asymmetric key distribution problem
Asymmetric Encryption
ASIACRYPT 2014
biblio
BigCrypt for Big Data Encryption
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
Pretty Good Privacy technique
zero tolerance security
symmetric key encryption
storage management
Software
Servers
RSA
Rijndael
Resiliency
resilience
Receivers
Public key
pubcrawl
probability
probabilistic approach
private information
Asymmetric Encryption
Metrics
Human behavior
Hadoop
Hacking
encryption
Data protection
Cryptography
Compositionality
cloud storage
Cloud Computing
BigCrypt
big data encryption
Big Data
asymmetric encryption technique
biblio
\#x003BC;DTNSec: A Security Layer for Disruption-Tolerant Networks on Microcontrollers
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
resilience
Metrics
microcontrollers
payload size
Payloads
performance evaluation
Protocols
pubcrawl
public key cryptography
man-in-the-middle attacks
Resiliency
Routing
secp128r1
secp192r1
secp256r1
security layer
store-carry-forward principle
μDTNSec
digital signatures
Asymmetric Encryption
asymmetric signatures
bundle protocol specification
Compositionality
Contiki OS
Cryptographic Protocols
delay tolerant networks
delay-disruption-tolerant networks
advanced encryption standard
disruption-tolerant networks
Elliptic curve cryptography
encryption
energy measurement
energy measurements
energy-constrained devices
hardware-backed symmetric encryption
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »