Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
decryption
biblio
SecTrans: Enhacing user privacy on Android Platform
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
resilience
Metrics
MIT
mobile computing
mobile phone
PDA
personal digital assistant
privacy
pubcrawl
Humanoid robots
Resiliency
RSA
Scalability
SecTrans
smart phones
textual data transmission
Triple DES
user data privacy
cellular radio
android
Android (operating system)
android encryption
Android mobile application
Android operating system
Androids
Blowfish
cell phone
AES
Cryptography
data privacy
decryption
encrypted format
encryption
Google
Human behavior
Human Factors
biblio
A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
replay-attack prevention
multi-receiver encryption
mutual authentication
pairing operations
performance evaluations
private key cryptography
pubcrawl
Public key
public key cryptography
Receivers
Metrics
resilience
Resiliency
Scalability
Schnorr
Schnorr-like lightweight identity-based partial private keys
sensitive personal data disclosure prevention
source authentication
Trusted Computing
trusted third party
encryption
android encryption
authentication
decryption
device to device communications
device-generated public keys
disclosure range control
Elliptic curves
embedded Android devices
embedded systems
Android (operating system)
Human behavior
Human Factors
implicit user authentication
Internet of Things
IoT (Internet of Things)
IoT applications
lightweight multireceiver encryption
message authentication
message integrity
biblio
A way to secure a QR code: SQR
Submitted by grigby1 on Tue, 01/23/2018 - 2:58pm
AES
Algorithm design and analysis
Cryptography
cyber physical systems
decryption
encryption
Generators
password
pubcrawl
QR codes
QR-Code
Resiliency
SQR
standards
biblio
An enhanced cryptographic model based on DNA approach
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
Asymmetric Encryption
authenticity
Ciphers
confidentiality
Cryptography
data communication
decryption
DNA
DNA computing
DNA cryptography
encryption
Human behavior
Metrics
privacy
pubcrawl
Resiliency
biblio
Practical and Secure IoT Device Authentication Using Physical Unclonable Functions
Submitted by grigby1 on Mon, 11/20/2017 - 12:28pm
Internet of Things
tractable cryptographic protocols
tamper resistance solutions
Tamper resistance
secure IoT device authentication
Resiliency
resilience
PUF-based authentication protocol
public key cryptography
pubcrawl
Protocols
private key exposure
private key cryptography
practical IoT device authentication
physical unclonable functions
output mapping
authentication
input mapping
Hardware
Games
elliptic curve-based variant
Elliptic curve cryptography
discrete logarithm problem
digital signatures
digital signature generation
device enrollment
decryption
Cryptography
Cryptographic Protocols
cost-effective tamper resistance
composability
biblio
Segmented Crypto Algorithm
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
asymmetric key cryptography
Bit wise shifting
cryptosystem
decryption
encryption
folding logic
Symmetric Key Cryptography
Asymmetric Encryption
biblio
FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption
Submitted by grigby1 on Thu, 04/20/2017 - 12:40pm
secure data transmission
Inverse S-Box transformations
network on chip
network on chip security
network security algorithm
pre-calculated look-up tables
precalculated LUT
pubcrawl
Resiliency
Rijndael
Scalability
inverse mix-columns transformations
Table lookup
timing
Verilog-HDL
Virtex-7 XC7VX690T chip
wired digital communication networks
wireless digital communication networks
Xilinx ISE Design Suite-14.7 Tool
Xilinx Virtex-7 FPGA
Xilinx XPower Analyzer
decryption
AES-128
AES-192
AES-256
AES Rijndael algorithm
Algorithm design and analysis
algorithmic functions
Clocks
composability
Cryptography
advanced encryption standard (AES)
encryption
Field Programmable Gate Array (FPGA)
field programmable gate arrays
FPGA based hardware implementation
Galois field multiplications
Galois fields
GF (28)
Hardware Description Language (HDL)
hardware description languages
biblio
Symmetric Cryptography Using Multiple Access Circular Queues (MACQ)
Submitted by grigby1 on Mon, 03/27/2017 - 10:52am
black box
black box encryption
Block Ciphering Algorithm
composability
Cryptography
decryption
encryption
Feistel cipher
Metrics
pubcrawl
Random NumberGenerators (RNGs)
Resiliency
S-box
symmetric cryptography
biblio
"Real time secure end to end communication over GSM network"
Submitted by grigby1 on Tue, 02/14/2017 - 12:18pm
GSM speech channel
transcoding
speech trans-coding process
Speech
real time secure end to end communication
pubcrawl170102
Modem
mobile phones
Mobile handsets
Mobile communication
cellular radio
GSM network
GSM
encryption
digital techniques
decryption
decoding algorithm
Cryptography
Codecs
biblio
"HRJ_encryption: An ASCII code based encryption algorithm and its implementation"
Submitted by grigby1 on Tue, 02/14/2017 - 12:10pm
information technology
Secret key
Receivers
public key cryptography
Public key
pubcrawl170102
private key cryptography
private key
Plain Text
personal desktop
Algorithm design and analysis
HRJ_encryption
encryption
decryption
Cloud Computing
cipher text
ASCII code based encryption algorithm
ASCII Code
arrays
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »