Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Secret key
biblio
A Secure and Efficient Analytical Encryption Method for Industrial Internet Identification based on SHA-256 and RSA
Submitted by aekwall on Fri, 02/17/2023 - 9:50am
Resiliency
Safe Coding
identification analysis
coding
mechatronics
codes
Dictionaries
policy-based governance
encoding
security
Metrics
pubcrawl
Public key
Secret key
encryption
Human Factors
information security
biblio
Cybersecurity Providing for Maritime Automatic Identification System
Submitted by aekwall on Fri, 01/20/2023 - 3:13pm
pubcrawl
Watermarking
Transponders
traffic control
security situational awareness
security
Secret key
Resiliency
Reliability
Artificial Intelligence
Protocols
Predictive Metrics
navigation
message authentication code
Gaussian Minimum Shift Keying
fast Fourier transform
composability
biblio
Malicious Vehicles Identifying and Trust Management Algorithm for Enhance the Security in 5G-VANET
Submitted by grigby1 on Wed, 08/10/2022 - 1:42pm
vehicular ad hoc networks
Trust Routing
Secret key
NOMA
Node trust
group re-cipher key
group public key
information trust
hash chain
Interference
security
Clustering algorithms
Prediction algorithms
composability
digital signature
Scalability
Conferences
Resiliency
resilience
pubcrawl
biblio
The Enforcement of Context Aware System Security Protocols with the Aid of Multi Factor Authentication
Submitted by aekwall on Wed, 07/07/2021 - 3:48pm
Human Factors
Ubiquitous Computing Security
single factor
security
Secret key
Scalability
Resiliency
pubcrawl
Multi - factor
Metrics
Kerberos
protocol verification
Human behavior
encryption
Cryptography
context awareness
authentication
privacy
policy-based governance
composability
Compositionality
biblio
Application of the Neural Networks for Cryptographic Information Security
Submitted by aekwall on Thu, 05/13/2021 - 10:30am
cyber physical systems
training set
Training
Switches
Secret key
pubcrawl
Neurons
information technology
information security
Neural Network Security
Cryptography
block ciphering
Biological neural networks
Artificial Neural Networks
Metrics
policy-based governance
Resiliency
cyber-physical systems
biblio
Optimization of Secret Key using cuckoo Search Algorithm for ensuring data integrity in TPA
Submitted by aekwall on Mon, 03/22/2021 - 12:07pm
optimization
TPA
third party auditors
secret key generation algorithms
Secret key
search problems
Resiliency
public key cryptography
pubcrawl
Predictive Metrics
auditing
encryption audits
encryption
decryption purpose
data integrity
cuckoo search algorithm
Cuckoo search
Compositionality
Cloud Computing
biblio
Horizontal Correlation Analysis of Elliptic Curve Diffie Hellman
Submitted by aekwall on Mon, 02/15/2021 - 3:57pm
maximum correlation
CW toolchain
distributed entities
ECDH
elliptic curve diffie hellman
Elliptic Curve Diffie Hellman key exchange protocol
HCPA
Horizontal Correlation Analysis
Horizontal Correlation Power Analysis
in-field sensors
key guess
crypto algorithm
NewAE Technologies
open source toolchain
potential threat
power traces
revolutionary technology transition
secure connectivity
side channel analysis
side-channel leaks
simple power analysis
word length -128.0 bit
Elliptic curve cryptography
FPGA
Scalability
Internet of Things
Hardware
Cryptographic Protocols
Resiliency
pubcrawl
Metrics
Correlation
public key cryptography
field programmable gate arrays
Elliptic curves
finite element analysis
correlation methods
Secret key
IoT systems
AES
Artix-7 FPGA
chipwhisperer
correlation power analysis
biblio
A Novel Logical Locking Technique Against Key-Guessing Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
Observability
intellectual property piracy
ISCAS'85 benchmark circuits
key guessing attacks
Key-gates
key-guessing attacks
logical locking
logical locking technique
logically locked design
intellectual property
path sensitization attacks
Secret key
secured hardware
secured locking mechanism
system analysis and design
Testability measures
Trojan insertion
brute force attacks
integrated circuits
Hardware
private key cryptography
Hamming distance
pubcrawl
collaboration
Computer crime
Human Factors
policy-based governance
invasive software
added logics
Brute Force Attack
embedded computing
hardware attacks
hill climbing attack
illegal integrated circuit overproduction
industrial property
biblio
Protect white-box AES to resist table composition attacks
Submitted by aekwall on Mon, 07/20/2020 - 9:54am
cryptographic software protection
white box cryptography
white-box cryptography
white-box attack context
white-box AES protection
WBAC
Time complexity
table-composition-targeting white-box attacks
table-composition-targeting cryptanalysis techniques
key-embedding lookup tables
key recovery attacks
De Mulder et al.'s attack
Resiliency
Billet et al.'s attack
affine mappings
Table lookup
Secret key
computational complexity
public key cryptography
Data protection
Metrics
composability
pubcrawl
biblio
White-box traceable dynamic attribute based encryption
Submitted by aekwall on Mon, 07/20/2020 - 9:45am
Silicon
white box cryptography
white-box traceable dynamic attribute based encryption
white-box traceability
user revocation
out-sourcing decryption
multiple users
decryption keys
CP-ABE scheme
ciphertext policy
access policy
malicious users
fine-grained access control
Cloud Computing
Secret key
pubcrawl
Games
Metrics
composability
Resiliency
private key cryptography
attribute-based encryption
encryption
authorisation
Servers
1
2
3
next ›
last »