Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
decryption
biblio
An Efficient SAT-Attack Algorithm Against Logic Encryption
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
information science
Superluminescent diodes
SAT-attack algorithm
SAT
Resiliency
resilience
pubcrawl
logic IP protection
Logic gates
logic encryption
integrated circuits
Benchmark testing
encryption
encrypted circuits
efficient encryption
decryption
cyber physical systems
Cyber Physical System
Cryptography
computability
composability
biblio
A Dynamic DNA for Key-Based Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 10:50am
geographical cryptography
traditional cryptographic approaches
text file
Resiliency
resilience
Reliability
Receivers
quantum cryptography
pubcrawl
privacy
plain text characters
Metrics
key-based cryptography
image file
Human behavior
audio file
encryption
encoding
effective cryptographic systems
dynamic DNA
DNA sequences
DNA digital coding
DNA cryptography
DNA
decryption
Cryptography
Ciphers
biometrics (access control)
biometric cryptography
biocomputing
biblio
Protecting Personal Information using Homomorphic Encryption for Person Re-identification
Submitted by aekwall on Mon, 12/30/2019 - 12:35pm
Cameras
personal information protection
personal information
Person re-identification
people matching
linear quantization
image matching
Quantization (signal)
quantisation (signal)
Homomorphic encryption
Human Factors
Scalability
authentication
Data protection
Metrics
pubcrawl
Resiliency
feature extraction
decryption
encryption
Cryptography
Servers
biblio
Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
local networks
transmission protocol
Symmetric Key Cryptography
secure data transmission
Resiliency
public key cryptography
pubcrawl
Protocols
node-to-node secure data transmission protocol
Node to node data transmission
Metrics
message authentication
low-power IoT devices
low-power devices
authentication
Kerberos
IoT devices exchange data
IoT
Internet of Things
internet
Human behavior
encryption
decryption
data communication
Cryptographic Protocols
computer network security
authorisation
biblio
An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based Cryptography
Submitted by grigby1 on Thu, 02/14/2019 - 11:13am
Ciphers
composability
Compositionality
computer security
decryption
DNA
DNA cryptography
encoding
encryption
Enhanced polyalphabetic Cipher algorithm
pubcrawl
theoretical cryptography
Vigenere cipher
biblio
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
Receivers
key size
Lagrange Polynomial
Linear Secret Sharing
private key cryptography
Productivity
Puncturable Attribute Based Encryption schemes
Puncturable Attribute-Based Encryption
punctured keys
key distributor
secret keys
secure data delivery
telecommunication security
Human behavior
pubcrawl
collaboration
policy-based governance
Scalability
key distribution center
IoT devices
Internet-of-Things
Internet of Things
forward encryption
fine grained access control
decryption
cybercriminals
Conferences
attribute-based key
attribute based encryption
attribute-based encryption
Access Control
encryption
authorisation
biblio
Implementation of SERPENT cryptographic algorithm for secured data transmission
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
key management
Technological innovation
symmetric key
substitution permutation network
SERPENT cryptographic algorithm
SERPENT
secured data transmission
s-box stage
round function
Resiliency
resilience
Repudiation
pubcrawl
Metrics
linear mixing stage
key scheduling
Algorithm design and analysis
IP networks
human factor
Human behavior
graphical programming tool
encryption
enciphering process
decryption
deciphering process
Data Security
data integrity
Cryptography
composability
Ciphers
Blockcipher
biblio
Towards Lightweight Identity-Based Encryption for the Post-Quantum-Secure Internet of Things
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
key discovery procedure
word length 80 bit
time 36 ms
time 103 ms
RLWE problem
Resiliency
resilience
reconfigurable hardware component
quantum cryptography
pubcrawl
post-quantum-secure Internet of Things
multiuser scenarios
microcontrollers
Metrics
low-cost ARM Cortex-M0 microcontroller
lightweight identity-based encryption
ad-hoc network connection
Internet of Things
internet
Identity-based encryption
IBE scheme
Human behavior
encryption
embedded device
decryption
data exchange security
computer network security
Compositionality
asymmetric key distribution problem
Asymmetric Encryption
ASIACRYPT 2014
biblio
Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
DSA
Three-dimensional displays
standards
Resiliency
resilience
Public key
pubcrawl
private and public key encryption
Metrics
Human behavior
encryption
elliptic curve
3DES
Diffie-Hellman and RSA
DES
decryption
Cryptography
Compositionality
Cloud Computing
Classification algorithms
Ciphers
Blowfish
Asymmetric Encryption
AES
biblio
De Duplication Scalable Secure File Sharing on Untrusted Storage in Big Data
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Resiliency
knowledge copy
knowledge deduplication
Metrics
Peer-to-peer computing
privacy issues
pubcrawl
Public key
resilience
knowledge confidentiality
Secure File Sharing
security
security issues
sensitive data
storage
Token
untrusted storage
Writing
data privacy
Big Data
ciphertexts
Cloud Computing
composability
confluent key
convergent secret writing
cryptographical hash price
Cryptography
ancient secret writing
decryption
deduplication scalable secure file sharing
embedded systems
encoding
encryption
hashkey
Human behavior
information copy
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »