Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hash functions
biblio
Optical Hash Function for High Speed and High Security Algorithm using Ring Resonator System
Submitted by grigby1 on Thu, 06/09/2022 - 2:36pm
pubcrawl
resilience
Heuristic algorithms
computer security
Compositionality
Hash Function
Hash functions
hash algorithms
Integrated optics
Resiliency
optical cryptography
Optical design
Optical filters
Optical solitons
Resonator filters
ring resonator
biblio
HashMTI: Scalable Mutation-based Taint Inference with Hash Records
Submitted by aekwall on Thu, 05/19/2022 - 1:37pm
Software
Scalability
Conferences
pubcrawl
Metrics
composability
Hash functions
Prototypes
fuzzing
Memory management
taint analysis
program analysis
Software Testing
biblio
Cryptanalysis and Improvement of Zheng's Signcryption Technique
Submitted by grigby1 on Tue, 04/26/2022 - 2:51pm
Message confidentiality and integrity
Signcryption technique
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Protocols
Performance analysis
Costs
Hash functions
encryption
ElGamal's digital signature
DSS
digital signatures
DHP
cryptographic hash functions
biblio
DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems
Submitted by grigby1 on Fri, 04/01/2022 - 1:08pm
Probabilistic logic
tag-based scheme
security definition
index generation
dynamic searchable symmetric encryption
database management system
Keyword search
searchable encryption
Hash functions
encryption
composability
Indexes
Software
Conferences
Resiliency
resilience
pubcrawl
biblio
Securing the Integrity of PDF Files using RSA Digital Signature and SHA-3 Hash Function
Submitted by aekwall on Fri, 02/04/2022 - 10:30am
verification
Repudiation
Signing
SHA-3
RSA algorithm
Portable document format
non repudiation
Keccak
file integrity
digital signature
data science
Databases
Distance measurement
public key cryptography
Hash functions
Receivers
composability
Human behavior
Resiliency
Metrics
pubcrawl
authentication
biblio
Securely Distributing Files in Cloud Environment by Dispensing Asymmetric Key Management System applying Hashing
Submitted by aekwall on Mon, 01/10/2022 - 12:46pm
Software
Cloud Computing
encryption
Public key
pubcrawl
Metrics
Human behavior
Hash functions
data integrity
Asymmetric Encryption
Compression function
Data protection
security policies
Resiliency
Compositionality
biblio
CRYLOGGER: Detecting Crypto Misuses Dynamically
Submitted by grigby1 on Mon, 12/20/2021 - 11:29am
Hash functions
tools
security
Resiliency
resilience
pubcrawl
privacy
Misuses
internet
Heuristic algorithms
android
encryption
Cryptography
Compositionality
composability
Application Programming Interface (API)
application program interfaces
Application program interface
APIs
API
biblio
Pollution Attacks on Counting Bloom Filters for Black Box Adversaries
Submitted by aekwall on Tue, 07/27/2021 - 1:58pm
Technological innovation
pollution attacks
Pollution
Integrated circuit modeling
Hash functions
Complexity theory
Black Box Attacks
Bloom filter
composability
Resiliency
Metrics
pubcrawl
field programmable gate arrays
security
biblio
Mitigating Localization and Neighbour Spoofing Attacks in Underwater Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 2:57pm
pubcrawl
wireless sensor networks
Underwater Networks
Topology
security
Scalability
Routing
Resiliency
resilience
Computational modeling
Open Source Software
Metrics
malicious node
localization
Impersonate
Hash functions
delays
Cyber Physical System
biblio
LABVS: Lightweight Authentication and Batch Verification Scheme for Universal Internet of Vehicles (UIoV)
Submitted by grigby1 on Wed, 06/30/2021 - 3:55pm
Metrics
Vehicle-to-grid
vehicle dynamics
security and privacy
Resiliency
resilience
Public key
pubcrawl
privacy
authentication
Internet of Vehicles (UIoV)
Internet of Vehicles
Human Factors
Human behavior
Hash functions
cyber physical systems
Batch verification
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »