Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ECC
biblio
Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
ECC
State Cryptography Administration
SM2 signature generation schemes
SM2 digital signature generation
SM2
secure cloud cryptography computing
secret sharing based cryptography
key exchange schemes
elliptic curve public key cryptography algorithm
additively homomorphic encryption
China
secret sharing
Homomorphic encryption
Cloud Computing
Elliptic curves
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
Software
data encryption
encryption
digital signature
Scalability
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
Elliptic curve cryptography
public signature verification problem
proxy signature scheme
private key exposure
FoSPS
forward secure proxy signature
directed signature scheme
cryptoanalysis
Computer security and privacy
handwriting recognition
ECC
Scalability
Security analysis
public key cryptography
digital signatures
pubcrawl
Resiliency
private key cryptography
data privacy
Computational efficiency
digital signature
biblio
Secure and Efficient Approach to Prevent Ad Hoc Network Attacks Using Intrusion Detection System
Submitted by grigby1 on Mon, 11/04/2019 - 12:39pm
mobile computing
Wireless communication
Ubuntu OS
telecommunication network topology
self-organizing
self-maintenance
security of data
security
secure mechanism
Router Systems Security
Resiliency
resilience
pubcrawl
NS 2.35 software
Ad hoc network attacks
mobile ad hoc networks
Metrics
MAES
Linux
intrusion detection system
Intrusion Detection
hybrid system
Elliptic curve cryptography
ECC
dynamic topology features
Conferences
Ad hoc networks
biblio
Prominence Of ECDSA Over RSA Digital Signature Algorithm
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
Human behavior
RSA Digital Signature Algorithm
RSA
Resiliency
resilience
Repudiation
public key cryptography
public key cryptographic algorithms
pubcrawl
non-repudiation
Metrics
composability
handwriting recognition
Elliptical Curve Digital Signature Algorithm
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDLP
ECC
digital signatures
cryptosystem
Conferences
biblio
A New Version of Kerberos Authentication Protocol Using ECC and Threshold Cryptography for Cloud Security
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Protocols
threshold cryptography
threshold
telecommunication security
Servers
security protocols
security of data
securities issues
RSA cryptography
RSA
Resiliency
public key cryptography
pubcrawl
authentication
protocol models
protocol
Metrics
Kerberos authentication protocol
Kerberos
Human behavior
high security
Elliptic curve cryptography
ECC
Cryptographic Protocols
Cloud Security
Cloud Computing
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication
biblio
Performance Analysis of Elliptic Curves for Real-Time Video Encryption
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Jitter
Streaming media
security
Resiliency
resilience
Real-time video streaming
real-time systems
pubcrawl
Metrics
Asymmetric Encryption
Human behavior
encryption
Elliptic curve cryptography
ECC
delays
Compositionality
composability
biblio
Secure Transition for Robotic Surgery With Elliptic Curve Diffie Hellman
Submitted by grigby1 on Fri, 02/08/2019 - 4:20pm
pubcrawl
Asymmetric Encryption
composability
Compositionality
DH
ECC
ECDH
Human behavior
Metrics
resilience
Resiliency
robotic surgery
biblio
A Robust Anonymity Preserving Authentication Protocol for IoT Devices
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
message authentication
telecommunication security
Servers
security mechanisms
robust anonymity preserving authentication protocol
Resiliency
resilience
radiofrequency identification
public key cryptography
pubcrawl
Protocols
privacy
online threat
Metrics
anonymity
lightweight authentication
IoT devices
Internet of Things
Human Factors
Human behavior
Generators
efficient public key cryptography mechanism
ECC
data privacy
Cryptographic Protocols
composability
authentication
« first
‹ previous
1
2
3
4
next ›
last »