Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hash functions
biblio
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
Submitted by aekwall on Mon, 06/08/2020 - 11:32am
hash collisions
hash algorithms
web portal
SHA-1
secured web portal
salt generation
salt algorithm
password hashing
matrix encryption key
Internet security
hash tables
hash message
Hash Function
Cryptography
enhanced secure hash algorithm-512
file organisation
Hash functions
Compositionality
Portals
Ciphers
password
web applications
Databases
pubcrawl
Resiliency
encryption
biblio
A Secure Network Coding System Against Wiretap Attacks
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
passive attacks
wiretap attacks
wiretap attack
wireless networks
wired networks
weak security
secure network coding system architecture
Routing
Resiliency
resilience
Receivers
random network coding system
random codes
pubcrawl
communication confidentiality
network performance metrics
network links
network coding
Metrics
Hash functions
encoding
eavesdropper
deterministic network coding system
cyber security
cyber physical systems
Cryptography
composability
biblio
Counterintuitive Characteristics of Optimal Distributed LRU Caching Over Unreliable Channels
Submitted by grigby1 on Tue, 02/18/2020 - 11:55am
single LRU cache
Nickel
optimal distributed LRU caching
Organizations
probability
reliability theory
reliable caches
resilience
Resiliency
resource management
Scalability
separate LRU caches
single-hop multicache distributed system
Mobile Edge Computing
storage management
symmetric channels
system design
System performance
total cache space
total memory space
unreliable channels
unreliable LRU caches
Web Caching
wired Web servers
wireless content delivery networks
data items
asymptotic miss probabilities
asymptotic miss probability
cache miss ratios
cache storage
channel unreliability probabilities
Communication Systems
counterintuitive characteristics
counterintuitive insights
critical method
data centers
Data-Intensive Applications
asymmetric cache organization
data placement
data replication schemes
data routing strategies
efficient cache organization
efficient data access
explicit unequal allocation policy
fast data access
fundamental method
Hash functions
LRU caching systems
Metrics
biblio
Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network
Submitted by aekwall on Mon, 01/20/2020 - 12:12pm
trustless network
Hash functions
initial trust setup phase
interactive zero knowledge proof
post quantum attacks
PoW
secure digital service payments
SHA3-finalists
tokenized assets
trusted third party
financial transactions
TTP
Witness Indistinguishability
Zcash
zero knowledge proof
zero knowledge proof method
ZKSNARK
ZKSTARK
zero trust
cryptocurrencies
Scalability
data confidentiality
Cryptographic Protocols
Resiliency
pubcrawl
policy-based governance
bitcoin
blockchain
security of data
smart contracts
multiparty computation
Proof-of-work
distributed network
Human Factors
blockchain ecosystem
enterprise applications
fair exchange
biblio
Lattice Based Authenticated Key Exchange with Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:23pm
Lattices
universally composable security
universal composability
telecommunication security
small integer solution
secure channels
ring-SIS based KEM
rapid development these years
quantum computers
quantum computation
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
message authentication
authenticated channels
lattice based cryptography
key encapsulation mechanism
IoT nodes
Internet of Things
Hash functions
Encapsulation
data privacy
Cryptography
Cryptographic Protocols
composability
authenticated key exchange scheme
authenticated key exchange protocol
authenticated key exchange
biblio
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
mirrors
Transistors
traditional approaches
stage physical unclonable functions design
security of data
security applications
security
Resiliency
resilience
Reliability
PUF
pubcrawl
privacy
physical unclonable function (PUF)
modelling attacks
32-bit current mirror
Mathematical model
machine learning attacks
machine learning
lightweight electronics
learning (artificial intelligence)
Hash functions
enhancing security
Current Mirror PUF
Cryptography
composability
CMOS integrated circuits
asynchronous circuits
Arbiter-PUF
65nm CMOS technology
biblio
An Efficient NSKDP Authentication Method to Secure Smart Grid
Submitted by grigby1 on Wed, 05/30/2018 - 4:09pm
privacy
Vulnerability
symmetric key distribution method
smart power grids
smart meters
Smart Grids
smart grid power
smart grid consumer privacy
Smart Grid
smart electric meters
Servers
secure smart grid
pubcrawl
private key cryptography
Communication networks
power system security
NSKDP authentication method
Meters
key management
Human Factors
Hash functions
encryption
cyber security
cryptography strategies
Cryptographic Protocols
countermeasures attacks
consumer energy supply
biblio
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
Compositionality
depth-robust graphs
hash algorithms
Hash functions
key stretching
memory hard functions
pubcrawl
Resiliency
biblio
Formal Computational Unlinkability Proofs of RFID Protocols
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
pubcrawl
unlinkability
Turing machines
tools
Theorem Proving
security protocols
security of data
RFIDs
RFID protocols
RFID
Resiliency
radiofrequency identification
communication complexity
Protocols
Human Factors
Human behavior
Hash functions
formal computational unlinkability proofs
Cryptography
Cryptographic Protocols
Computational modeling
computational model
computational complete symbolic attacker
biblio
A lightweight RFID authentication protocol with confidentiality and anonymity
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy
telecommunication security
RFIDs
RFID tags
RFID system
RFID
Resiliency
replay attack
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
protocol
privacy and security
authentication
open wireless radio wave
on-chip CRC function
low-cost passive tags
location trace
lightweight RFID authentication protocol
Internet of Things
Human Factors
Human behavior
Hash functions
eavesdropping prevention
DOS-attack prevention
Cryptography
Cryptographic Protocols
CRC
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »