Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Asymmetric Encryption
biblio
Intelligent Security Framework for Iot Devices Cryptography Based End-to-End Security Architecture
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
IoT service gateway
lattice-based cryptography
light weight asymmetric cryptography
Logic gates
low power sensor nodes
Metrics
network attacks
Protocols
pubcrawl
Public key
IoT security
quantum attack
resilience
Resiliency
security issues
security of data
sensors
session key
symmetric encryption
wireless sensors
encryption
asymmetric key encryption
authentication
cloud services
Compositionality
computer network security
Cryptographic Protocols
Cryptography
data privacy
DDoS
distributed denial of service attacks
Asymmetric Encryption
End-To-End devices
end-to-end security architecture
Human behavior
Intelligent security framework
intelligent service
Internet of Thing
Internet of Things
internetworking
iot devices cryptography
biblio
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
internet
Servers
security risks
scalar product preserving encryption
Resiliency
resilience
query answering
pubcrawl
product preservation property
outsourcing
Metrics
Mathematical model
ASPE
Indexes
Human behavior
encryption
Cryptography
confidential information
Compositionality
Cloud Computing
ciphertexts
asymmetric scalar-product-preserving encryption
Asymmetric Encryption
biblio
Database Encryption Using Asymmetric Keys: A Case Study
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
encryption
web applications
test database
RSA
Resiliency
resilience
pubcrawl
padding
Metrics
Java API
Java
internet
Human behavior
encryption-decryption keys
encryption keys
encryption algorithms
application performance decrease
Encrypted database
ElGamal
ECIES
Distributed databases
Databases
database encryption
Data Security
Cryptography
cryptographic algorithms
Compositionality
Benchmark testing
asymmetric keys
Asymmetric Encryption
application program interfaces
biblio
The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
Elliptic curves
Supercomputers
RSA algorithm
Resistance
Resiliency
resilience
pubcrawl
Metrics
method
Human behavior
GOST R 34.10-2001 algorithm
encryption
Algorithm design and analysis
durability
Cryptography
cryptographic strength
computer technology
Compositionality
Clustering algorithms
asymmetric encryption algorithms
asymmetric encryption algorithm
Asymmetric Encryption
Assessment
biblio
Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
DSA
Three-dimensional displays
standards
Resiliency
resilience
Public key
pubcrawl
private and public key encryption
Metrics
Human behavior
encryption
elliptic curve
3DES
Diffie-Hellman and RSA
DES
decryption
Cryptography
Compositionality
Cloud Computing
Classification algorithms
Ciphers
Blowfish
Asymmetric Encryption
AES
biblio
An enhanced cryptographic model based on DNA approach
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
Asymmetric Encryption
authenticity
Ciphers
confidentiality
Cryptography
data communication
decryption
DNA
DNA computing
DNA cryptography
encryption
Human behavior
Metrics
privacy
pubcrawl
Resiliency
biblio
Obfuscating Conjunctions Under Entropic Ring LWE
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
obfuscation
Asymmetric Encryption
biblio
Anonymous Identity-Based Broadcast Encryption with Constant Decryption Complexity and Strong Security
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
adaptive attack
anonymous identity-based broadcast encryption
constant decryption complexity
random oracle model
standard model
Asymmetric Encryption
biblio
High-Performance and Lightweight Lattice-Based Public-Key Encryption
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
atxmega
cortex-m0
ideal lattices
Learning with errors
public-key encryption
Asymmetric Encryption
biblio
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE Without Knowledge of the Plaintext
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
constant size
identity-based broadcast encryption
recipients
revocation
Asymmetric Encryption
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »