Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption time
biblio
Performance Analysis on Enhanced Round Function of SIMECK Block Cipher
Submitted by grigby1 on Tue, 03/09/2021 - 1:39pm
enhanced round function
policy-based governance
Human Factors
security measurements
Performance analysis
lightweight block ciphers
security requirements
resource-constrained devices
Internet of Things technologies
security level
algorithm design
enhanced ARX structure
Cryptography
LBC
IoT
encryption time
SIMON
SIMECK family block cipher
avalanche effect
Brute-force Attack
brute force attacks
software performance evaluation
Internet of Things
biblio
An Efficient Framework for Big Data Security Based on Selection Encryption on Amazonec2
Submitted by grigby1 on Tue, 01/07/2020 - 9:54am
encryption
unimportant portion
Toss-A-Coin method
Selective Encryption
selection encryption
security framework
Resiliency
resilience
pubcrawl
ordinary encryption methods
Indexes
encryption time
encryption method
Amazon EC2
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
computer science
composability
Cloud Computing
cloud
Ciphers
big data security
Big Data
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 1:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
biblio
An architectural framework for encryption amp; generation of digital signature using DNA cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:05am
DNA computing DNA cryptography
Steganography
plaintext size
key size
information security
encryption time
encryption algorithms
encryption
encoding
DNA digital coding
DNA cryptography
architectural framework
DNA computing
DNA
digital signatures
digital signature generation
digital signature encryption
decryption time
cryptanalysis
Ciphers
biocomputing