Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hash functions
biblio
A Yoking-Proof and PUF-based Mutual Authentication Scheme for Cloud-aided Wearable Devices
Submitted by grigby1 on Thu, 05/20/2021 - 12:16pm
pubcrawl
Yoking Proof
wearables security
Wearable Device
wearable computers
Servers
Scalability
Resiliency
resilience
PUF-based
authentication
Protocols
privacy
Physical Unclonable Function
Metrics
IoT
Human behavior
Hash functions
Cloud Computing
biblio
A Direct Anonymous Attestation Scheme Based on Mimic Defense Mechanism
Submitted by grigby1 on Thu, 05/13/2021 - 2:08pm
machine-to-machine communications
Servers
Resiliency
resilience
Public key
pubcrawl
Protocols
privacy
mimic defense
Active Defense
M2M
Internet of Things
Human behavior
Hash functions
composability
attestation
anonymous attestation
biblio
Lightweight Verification and Fine-grained Access Control in Named Data Networking Based on Schnorr Signature and Hash Functions
Submitted by aekwall on Mon, 05/03/2021 - 1:15pm
encryption
Access Control
Resiliency
pubcrawl
internet
Mathematical model
authentication
Public key
verification
Scalability
NDN
Predictive Metrics
Compositionality
Schnorr signature
Hash functions
scalable verification
biblio
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
Submitted by aekwall on Mon, 03/29/2021 - 12:08pm
Hash functions
unique ledger
tree-chain
scalable fast blockchain instantiation
parallel chain branches
nonmonetary applications
high transaction delays
hash function output
fast lightweight consensus algorithm
consensus code
Consensus algorithm
computationally expensive validator selection
hash algorithms
Cryptography
Compositionality
Public key
Throughput
pubcrawl
delays
trees (mathematics)
blockchain
Resiliency
IoT applications
Internet of Things (IoT)
security
Internet of Things
biblio
Fixed Point Attack on Lin et al.’s Modified Hash Function Scheme based on SMALLPRESENT-[8] Algorithm
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
Hash functions
SMALLPRESENT-[8] algorithm
SMALLPRESENT-[8]
mac
Lin et al.’s scheme
Lin et al.’s modified scheme
hash function message authentication codes block cipher based scheme
fixed point messages discovery
fixed point attack
Compression function
hash algorithms
Cryptography
scheduling
Transforms
Compositionality
Ciphers
pubcrawl
message authentication
authentication
Resiliency
Classification algorithms
encryption
biblio
An Encryption and Decryption Algorithm Based on Random Dynamic Hash and Bits Scrambling
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
Filling
stream cipher algorithm
stream cipher
Resiliency
Random Dynamic Hash
pubcrawl
Lenses
Heuristic algorithms
hash mapping address
Hash functions
hash algorithms
binary random dynamic hash
Europe
encryption method
encryption
decryption methods
Cryptography
Compositionality
ciphertext space
Ciphers
bits scrambling
biblio
A Hardware Implementation of the SHA2 Hash Algorithms Using CMOS 28nm Technology
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
Hardware Implementation
SHA2 Hash algorithms
SHA-256
secure hash algorithm 2
hardware hash accelerator
CMOS 28nm technology
hash algorithms
Hash functions
adders
field programmable gate arrays
Compositionality
pubcrawl
CMOS technology
CMOS integrated circuits
Resiliency
Program processors
Hardware
Cryptography
biblio
Distributed Transform Encoder to Improve Diffie-Hellman Protocol for Big Message Security
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
Human behavior
security
Public key
pubcrawl
Protocols
policy-based governance
Main in the Middle Attack
Long Messages Encryption
Human Factors
Brute Force Attack
Hash functions
Force
encryption
distribution transforming encoder
Diffie-Hellman protocol
Cryptography
brute force attacks
biblio
MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection
Submitted by grigby1 on Wed, 02/10/2021 - 1:12pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Cryptography
Runtime
Browsers
Semantics
Systematics
Hash functions
Focusing
cryptomining
cryptojacking
Webassembly
biblio
Are You a Favorite Target For Cryptojacking? A Case-Control Study On The Cryptojacking Ecosystem
Submitted by grigby1 on Wed, 02/10/2021 - 1:10pm
Web sites
risk assessment
CryptoJacking websites
cryptojacking ecosystem
cryptojacking campaigns
compromised websites
Case-control study
browser-based mining
cryptojacking
cryptocurrency
Web servers
Hash functions
Cryptography
bitcoin
Semantics
privacy
Ecosystems
Resiliency
resilience
Metrics
Human behavior
pubcrawl
cryptocurrencies
Data mining
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »