Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hash functions
biblio
A Quantum Concurrent Signature Scheme Based on the Quantum Finite Automata Signature Scheme
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Quantum circuit
Scalability
Resiliency
quantum hash function
quantum finite automata signature scheme
Quantum entanglement
quantum digital signatures
quantum digital signature
quantum cryptography
quantum concurrent signature scheme
quantum concurrent signature
quantum computing security
quantum computing environment
quantum computing
public key cryptography
invertibility
Hash functions
finite automata
digital signatures
Cryptography
concurrent signatures scheme
complex quantum operations
automata
ambiguous signatures
pubcrawl
security
biblio
Decentralized Attestation of Conceptual Models Using the Ethereum Blockchain
Submitted by aekwall on Mon, 08/17/2020 - 10:36am
Ethereum blockchain
software connector
globally unique identifiers
existence proofs
Ethereum account
Decentralized Identifiers
decentralized attestation methods
cryptographic verification
Conceptual Modeling
blockchain-based attestation
ADOxx metamodeling platform
distributed ledger
Hash functions
Cryptography
certification
ethereum
smart contracts
Distributed databases
blockchain
composability
pubcrawl
Human behavior
Resiliency
computer architecture
attestation
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 9:58am
man-in-the-middle
weak point
update package encryption process
update
target hardware
symmetric encryption algorithms
symmetric encryption
specific encryption algorithms
secure update process
secure firmware update
safety critical operations
potential attackers
man-in-the-middle attacks
great numbers
asymmetric encryption algorithms
Asymmetric Encryption
security
Hash functions
intellectual property
confidentiality
authenticity
Embedded System
firmware
Metrics
composability
pubcrawl
Resiliency
embedded devices
embedded systems
telecommunication security
Cryptography
biblio
Optimization of a Quantum-Secure Sponge-Based Hash Message Authentication Protocol
Submitted by grigby1 on Fri, 06/12/2020 - 11:10am
Protocols
Xilinx High-Level Synthesis
sponge-based SHA-3 hashing algorithm
sponge functions
SHA-2
SHA-1
Resiliency
resilience
quantum-secure sponge-based hash message authentication protocol
quantum cryptography
quantum computing standpoint
quantum computing
pubcrawl
Compositionality
post-quantum-secure SHA-3 hash message authentication
pipelined version
optimized version
optimization
networking security protocols
message authentication
hashing standard
Hash functions
hash algorithms
Hardware
fundamental building block
Cryptographic Protocols
biblio
Slot Assignment Algorithm Based on Hash Function for Multi-target RFID System
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
radiofrequency identification
wireless sensor networks
Throughput
telecommunication congestion control
tags collision
Tag matching
Tag group
Stability analysis
Smart tags
slot assignment algorithm
simulation
Resiliency
resilience
ALOHA algorithm
pubcrawl
object detection
Multitarget tags assignment slots algorithm
Multitarget RFID system
Multitag identification technique
Heuristic algorithms
Hash functions
Hash Function
hash algorithms
Compositionality
anti-collision algorithms
Anti-collision
biblio
Enhanced Secure Hash Algorithm-512 based on Quadratic Function
Submitted by grigby1 on Fri, 06/12/2020 - 11:09am
hash outputs
Urban areas
SHA-1
Resiliency
resilience
Registers
quadratic function
pubcrawl
primitive function
password
mobile ad hoc networks
avalanche effect
hash message
Hash functions
hash collisions
hash collision
hash algorithms
extended bits
enhanced SHA-1 algorithm
enhanced secure hash algorithm-512
Cryptography
Compositionality
biblio
Supervised Max Hashing for Similarity Image Retrieval
Submitted by grigby1 on Fri, 06/12/2020 - 11:08am
resilience
hashing
image retrieval
k-ary base
labeled image datasets
learning (artificial intelligence)
mathematically differentiable approximation
nearest neighbor search
pubcrawl
Quantization (signal)
Hash functions
Resiliency
rich feature vectors
Semantics
similarity image retrieval
storage efficiency
supervised hashing methods
supervised max hashing
Training
feature vector generation
-Learning-to-Hash
-Winner-Take-All-Hash-Family
Approximation algorithms
argmax function
Compositionality
convolutional neural nets
convolutional neural networks
deep neural network architecture
feature extraction
-Convolutional-Neural-Networks
file organisation
gradient descent methods
gradient methods
hand-crafted feature vectors
hash algorithm
hash algorithms
hash code
Hash Function
biblio
Hash Functions are Based on Three-Dimensional Stochastic Transformations
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
stochastic methods-of-information security
input data blocks
level-of-elementary operations
memory size 4.0 Byte
output data blocks
parallel machines
pseudo-random sequence
resulting transformation
square and cube architecture
heterogeneous supercomputer technologies
stochastic protection methods
stochastic transformation
Supercomputers
three-dimensional bytes array
three-dimensional stochastic transformations
unpredictability injection
hash algorithms
Cryptography
effective protection
DOZENHASH hashing algorithm
3D stochastic transformations
Hash functions
Stochastic processes
Three-dimensional displays
Compositionality
pseudorandom number generators
statistical testing
random number generation
Generators
NIST
pubcrawl
Resiliency
information security
biblio
An Efficient Hash-Tree-Based Algorithm in Mining Sequential Patterns with Topology Constraint
Submitted by aekwall on Mon, 06/08/2020 - 10:34am
Sun
efficient hash-tree-based algorithm
hash tree efficiency
hash-tree based mining
hash-tree search method
mining efficiency
network physical connection data
sequential mining algorithm
sequential pattern mining
association rules
topology constraint
topology relation
topology structure
transmission network
transmission networks
warning Weblogs
hash algorithms
Pattern recognition
Resiliency
pubcrawl
internet
Business
trees (mathematics)
Data mining
network topology
network nodes
Conferences
Topology
telecommunication network topology
Compositionality
Hash functions
hash tree
tree searching
alarm association rules
biblio
Locality-Sensitive Hashing Scheme Based on Heap Sort of Hash Bucket
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
locality-sensitive hashing algorithm
tree searching
tree search method
space complexity
Sorting
Resiliency
query processing
pubcrawl
Pattern recognition
NNS
nearest neighbour methods
nearest neighbor search
nearest neighbor query
machine learning
C2LSH
locality sensitive hashing
Image detection
Heapsort
heap sort of hash bucket algorithm
hash table
Hash functions
hash algorithms
file organisation
data sorting
Cryptography
computational complexity
Compositionality
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »