Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ECC
biblio
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
public key cryptography
Metrics
Montgomery multiplier
multiplying circuits
open-source software PBC implementation
optimal Ate pairing
Pairing based cryptography
pairing-based cryptography
PKC
Power measurement
pubcrawl
low-power electronics
public-key cryptography
Repudiation
resilience
Resiliency
sensors
simple power analysis
Software
system-on-chip
Zynq-7020 SoC
embedded electronic devices
Barreto-Naehrig curves
circuit optimisation
Clocks
composability
cryptographic services
cryptographic system
Cryptography
Differential Power Analysis
ECC
embedded
ARM Cortex A9 processor
energy consumption
field programmable gate arrays
Hardware
hardware-software co-design
hardware-software codesign
Human behavior
human factor
light-weight hardware/software co-design
lightweight devices
biblio
Secure Protocol for Subscriber Identity Module
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
SIM
Protocols
pubcrawl
Ransomware
resilience
Resiliency
secure protocol
service provider
short messaging service
Poles and towers
social engineering
stolen SIM
subscriber Identity Module
user contacts
user credentials
user sensitive information
VLR
HLR
authorisation
banking information
Carrier
composability
current SIM model
data privacy
ECC
Elliptic curve cryptography
authentication
IMSI
internet
message authentication
Metrics
Mobile communication
Mobile handsets
modern mobile communication
biblio
Enhancing data security of iOS client by encryption algorithm
Submitted by K_Hooper on Wed, 02/28/2018 - 11:34am
Human Factors
sensitive data
Resiliency
pubcrawl
mobile devices
Metrics
iOS Security
iOS devices
iOS client
iOS (operating system)
information security
Compositionality
encryption algorithms
EDS
ECC encryption algorithms
ECC
desktop computer
DES encryption algorithm
Data Transmission
Data Security
Cryptography
biblio
Secure lightweight ECC-based protocol for multi-agent IoT systems
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Computational efficiency
ECC
Elliptic curve cryptography
IoT
location-based services
Metrics
mobile agents
Multi-agents
Protocols
pubcrawl
Resiliency
RSA
Scalability
Servers
biblio
A new elliptic curve cryptographic system over the finite fields
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
pubcrawl
matrix algebra
Menezes Qu Vanstone encryption protocols
message authentication
Metrics
network communications
private key cryptography
private key matrices
Protocols
Mathematical model
public key cryptography
public key vectors
Resiliency
Scalability
secure communication
security
square matrices
Cayley Hamilton theorem
key exchange authentication
invertible matrix
finite fields
encryption
Elliptic curves
Elliptic curve cryptography
elliptic curve cryptographic system
ElGamal
ECC
Discrete Logarithms Problems
discrete logarithms
Diffie Hellman protocol
cyber security
cryptosystems
Cryptographic Protocols
biblio
Mutual Authentication Protocol for RFID Based on ECC
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Public key
tracking attacks
telecommunication security
system internal attack
Servers
security scalability
security protocol
Scalability
RFID systems
Resists
Resiliency
radiofrequency identification
radio frequency identification
authentication
pubcrawl
Protocols
mutual authentication protocol
mutual authentication
Metrics
Internet of things security and privacy
forward security
Elliptic curve cryptography
ECC
Denial of Service attacks
Cryptographic Protocols
camouflage attacks
biblio
A survey: A secure routing method for detecting false reports and gray-hole attacks along with Elliptic Curve Cryptography in wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:58am
public key cryptography
wireless sensor networks
Wireless Sensor Network
statistical en-route filtering
Statistical En-Route
security
secure routing method
Secure Routing
Routing protocols
Routing
ad hoc on demand distance vector protocol
Protocols
individual sensor nodes
Gray hole attack
false report detection
Elliptic curve cryptography
ECC
Base stations
AODV protocol
AODV
« first
‹ previous
1
2
3
4