Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
quantum computing
biblio
Code-Based Schemes for Post-Quantum Digital Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Complexity theory
quantum security
post-quantum digital signatures
electronic digital signature
code-based schemes
code-based cryptography
CFS scheme
quantum computing
Post-quantum cryptography
Scalability
quantum cryptography
public key cryptography
Public key
digital signatures
Decoding
pubcrawl
Resiliency
digital signature
biblio
Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Bitcoin cryptocurrency
Winternitz one-time signature scheme
stateful hash-based signature schemes
stateful hash-based digital signature schemes
signature verification
Signature Generation
Rivest Shamir Adleman
Post-quantum cryptography
Merkle signature scheme
Lamport one-time signature scheme
Hash-based Digital Signature
elliptic curve digital signature algorithm
discrete logarithm problems
Scalability
Bitcoim
Hash Function
quantum computers
cryptocurrency
security levels
quantum cryptography
quantum computing
digital signatures
cryptocurrencies
pubcrawl
Resiliency
biblio
Optimization of a Quantum-Secure Sponge-Based Hash Message Authentication Protocol
Submitted by grigby1 on Fri, 06/12/2020 - 12:10pm
Protocols
Xilinx High-Level Synthesis
sponge-based SHA-3 hashing algorithm
sponge functions
SHA-2
SHA-1
Resiliency
resilience
quantum-secure sponge-based hash message authentication protocol
quantum cryptography
quantum computing standpoint
quantum computing
pubcrawl
Compositionality
post-quantum-secure SHA-3 hash message authentication
pipelined version
optimized version
optimization
networking security protocols
message authentication
hashing standard
Hash functions
hash algorithms
Hardware
fundamental building block
Cryptographic Protocols
biblio
A Lightweight Quantum-Safe Security Concept for Wireless Sensor Network Communication
Submitted by aekwall on Mon, 03/30/2020 - 11:42am
quantum computers
wireless sensor networks
Wireless Sensor network communication
ubiquitous internetworking
tiny sensor nodes
telecommunication security
stage permeated filtering mechanism
security of data
Scalability
resource-aware security
Resiliency
quantum cryptography
quantum computing security
quantum computing
Pervasive Computing Security
pubcrawl
Predictive Metrics
lightweight quantum-safe security concept
Intrusion Detection Systems
internetworking
Internet of Things
filtering theory
distributed sensor nodes
contemporary cryptographic mechanisms
Computers
composability
Ciphers
Base stations
biblio
New Quantum Secret Sharing Protocol Using Entangled Qutrits
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
Communication channels
quantum computing security
security amplification
quantum secure direct communication
quantum secret sharing protocol
Quantum secret sharing
quantum memory
ping-pong protocol
Optimized production technology
entangled qutrits
entangled qubits
eavesdropping attack
detection of eavesdropping
Scalability
Quantum entanglement
Predictive Metrics
quantum cryptography
quantum computing
Cryptography
composability
pubcrawl
Resiliency
eavesdropping
Protocols
telecommunication security
biblio
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
promptly developed areas
document circulation
extended classification
human life
important directions
information confidentiality
information transactions
loophole of the device
mini-computer
non-coherent attack
open communication networks
cryptographic methods
quantum cryptography methods
quantum cryptography systems
quantum cryptosystems
quantum hacking
quantum key distribution equipment
reliable information security technology
reliable security
specific quantum systems
traditional cryptography methods
quantum computing security
Reliability
Computer crime
Scalability
data privacy
telecommunication security
Protocols
Resiliency
pubcrawl
composability
classification
Handheld computers
security of data
quantum cryptography
quantum computing
Predictive Metrics
information technologies
Quantum Key Distribution
quantum protocols
abstract eavesdropper model
coherent attack
commercially available quantum key distribution system
biblio
Quantum Services Architecture in Softwarized Infrastructures
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
quantum technologies
mature development
network integration
open Interfaces.
QKD systems
quantum principles
quantum random number generators
quantum resources
Quantum services architecture
Quantum Switch
quantum switches
Madrid Quantum Network
quantum-safe methods
SDN quantum node architecture
secure bit streams
service automation
single network element
software-defined networking architectures
softwarized infrastructures
specific network cards
Telecommunication standards
quantum computing security
quantum cryptography
security
Protocols
computer architecture
software defined networking
Resiliency
pubcrawl
composability
standards
software-defined networking
quantum computing
Scalability
quality of service
random number generation
security infrastructure
Switches
Predictive Metrics
Quantum Key Distribution
current networking technology
forward key material
key exchange primitive
logically centralized SDN controller
biblio
Prototype Container-Based Platform for Extreme Quantum Computing Algorithm Development
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
Docker container environment
quantum computing security
rapid prototype development
quantum simulators
quantum computing hardware platforms
quantum computing devices
quantum computing algorithm development
quantum computer
Qiskit source codes
prototype environment
prototype container-based platform
prototype container system
prototype container based system
IBM Q Experience Web site
IBM Q Experience
Docker Containers
Cloud Computing
computer security challenges
cloud computing system
cloud computing software environment
Prototypes
Predictive Metrics
quantum computing
Containers
source code (software)
Libraries
composability
pubcrawl
Resiliency
Software
Hardware
Scalability
biblio
Demonstrating Quantum Advantage in Security and Efficiency with Practical Photonic Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
entangled resources
quantum computing security
telecommunication network infrastructures
secret key distribution
quantum optics
quantum networks
quantum money
Quantum entanglement
quantum advantage
practical photonic systems
Photonics
photonic systems
maximal security guarantees
future quantum-safe communications
Scalability
central quantum network protocols
quantum communication
network environment
Predictive Metrics
quantum cryptography
quantum computing
composability
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Cryptography
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 10:41am
Random walks
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
pubcrawl
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
Cryptography
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
automated driving systems
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »