Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hash functions
biblio
New Image Encryption Algorithm based on Pixel Confusion-Diffusion using Hash Functions and Chaotic Map
Submitted by grigby1 on Fri, 08/11/2023 - 1:56pm
machine learning algorithms
pubcrawl
resilience
Resiliency
privacy
chaotic communication
Compositionality
Hash functions
Quantization (signal)
hash algorithms
image encryption
Resists
chaos theory
Diffusion processes
pixel confusion and diffusion
biblio
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
Hash Function
Secure hash algorithms
pseudo-random number generator
occupational safety
Algorithms
SHA
attacks
cryptanalysis
information science
hash algorithms
pubcrawl
Hash functions
Resistance
Compositionality
NIST
Cryptography
Generators
Heuristic algorithms
Resiliency
resilience
biblio
Design and implementation of efficient hash functions
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
pubcrawl
resilience
Resiliency
Conferences
network security
power electronics
Compositionality
Hash Function
Hash functions
hash algorithms
Computer applications
Focusing
passwords
MD5
biblio
Implementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
hash algorithms
Rail Fence Cipher
Myszkowski
SHA-256
Rails
Hash Function
digital images
Image resolution
Multimedia systems
Ciphers
Hash functions
Histograms
Compositionality
Cryptography
Resiliency
resilience
pubcrawl
biblio
Ibn Omar Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:54pm
Hash functions
SHA-512
MD5
Ibn Omar
SHA-256
passwords
Linguistics
hash algorithms
hash
information security
Force
Compositionality
Complexity theory
privacy
Resiliency
resilience
pubcrawl
biblio
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks
Submitted by grigby1 on Fri, 08/11/2023 - 1:54pm
Internet of Things
security
pubcrawl
resilience
Resiliency
authentication
Complexity theory
Compositionality
Internet of Things (IoT)
Hash functions
hash algorithms
Mission critical systems
Power supplies
hash chain
biblio
Enhancing the Performance of Hash Function Using Autonomous Initial Value Proposed Secure Hash Algorithm 256
Submitted by grigby1 on Fri, 08/11/2023 - 1:53pm
Hash functions
secure hash function
padding
Key Constant
Initial Value (IV)
hash code
codes
data communication
hash algorithms
security
Python
Compositionality
authentication
Conferences
Resiliency
resilience
pubcrawl
biblio
Comparative Analysis of Password Storage Security using Double Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:53pm
Hash functions
password security
Message Digest (MD)
collision attack
Brute Force Attack
passwords
Spraying
Secure Hash Algorithm (SHA)
hash algorithms
Computer hacking
Force
Compositionality
Companies
Databases
Resiliency
resilience
pubcrawl
biblio
A Classification Method of Power Unstructured Encrypted Data Based on Fuzzy Data Matching
Submitted by grigby1 on Mon, 07/31/2023 - 1:26pm
Classification algorithms
multi-keyword matching
fuzzy matching
Fuzzy Cryptography
searchable encryption
filtering algorithms
data classification
Hash functions
power grids
Servers
Cryptography
Data models
Scalability
Resiliency
resilience
Metrics
pubcrawl
biblio
Digital Certificate Authentication with Three-Level Cryptography (SHA-256, DSA, 3DES)
Submitted by grigby1 on Thu, 06/29/2023 - 12:04pm
security
pubcrawl
resilience
Resiliency
Scalability
authentication
Cryptography
digital signatures
Three-dimensional displays
Hash functions
digital signature
DSA
Seminars
3DES
SHA-256
1
2
3
4
5
6
7
next ›
last »