Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hash Function
biblio
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
Hash Function
Secure hash algorithms
pseudo-random number generator
occupational safety
Algorithms
SHA
attacks
cryptanalysis
information science
hash algorithms
pubcrawl
Hash functions
Resistance
Compositionality
NIST
Cryptography
Generators
Heuristic algorithms
Resiliency
resilience
biblio
Design and implementation of efficient hash functions
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
pubcrawl
resilience
Resiliency
Conferences
network security
power electronics
Compositionality
Hash Function
Hash functions
hash algorithms
Computer applications
Focusing
passwords
MD5
biblio
Implementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
hash algorithms
Rail Fence Cipher
Myszkowski
SHA-256
Rails
Hash Function
digital images
Image resolution
Multimedia systems
Ciphers
Hash functions
Histograms
Compositionality
Cryptography
Resiliency
resilience
pubcrawl
biblio
A Secured Peer-to-Peer Messaging System Based on Blockchain
Submitted by grigby1 on Fri, 02/03/2023 - 5:15pm
authentication
proof of work (PoW)
Message
peer to peer security
blockchains
Hash Function
Mobile Applications
Protocols
Data models
security
Scalability
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Peer-to-peer computing
blockchain
biblio
Confirmation of Mutual Synchronization of the TPMs Using Hash Functions
Submitted by grigby1 on Thu, 06/09/2022 - 2:37pm
Hash Function
tree parity machines
synchronization time
ping
learning rules
input neurons
Hebbian rule
Resiliency
delay
hash algorithms
hash
Hash functions
Cryptography
Network
Market research
Synchronization
graphics processing units
Compositionality
Task Analysis
Neural networks
delays
resilience
pubcrawl
encryption
biblio
Perfect Tabular Hashing in Pseudolinear Time
Submitted by grigby1 on Thu, 06/09/2022 - 2:37pm
pubcrawl
resilience
Conferences
Prototypes
Compositionality
hash table
Time complexity
Hash Function
Hash functions
hash algorithms
Resiliency
2SAT
perfect hashing
SAT
tabulation hashing
biblio
Optical Hash Function for High Speed and High Security Algorithm using Ring Resonator System
Submitted by grigby1 on Thu, 06/09/2022 - 2:36pm
pubcrawl
resilience
Heuristic algorithms
computer security
Compositionality
Hash Function
Hash functions
hash algorithms
Integrated optics
Resiliency
optical cryptography
Optical design
Optical filters
Optical solitons
Resonator filters
ring resonator
biblio
Design and Implementation of an Efficient Elliptic Curve Digital Signature Algorithm (ECDSA)
Submitted by grigby1 on Thu, 05/05/2022 - 2:20pm
mechatronics
Scalability
Resiliency
resilience
Python
pubcrawl
Phase modulation
NIST P-521 Curve
NIST
Metrics
composability
Inversion in modulation
Hash Function
handwriting recognition
finite fields
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
Elliptic curve cryptography
Conferences
biblio
Significance of Elliptic Curve Cryptography in Blockchain IoT with Comparative Analysis of RSA Algorithm
Submitted by grigby1 on Tue, 02/22/2022 - 1:25pm
Metrics
Stakeholders
signature
Scalability
RSA
Resiliency
resilience
pubcrawl
privacy
peer-to-peer security
Peer-to-peer computing
peer to peer security
IoTBC
Internet of Things
Intelligent systems
Human Factors
Hash Function
Elliptic curve cryptography
ECDSA
ECC
digital
blockchain
biblio
Evolutionary Design of Hash Functions for IPv6 Network Flow Hashing
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
network flow
transport protocols
nondominated sorting genetic algorithm II
network monitoring probes
multiobjective evolutionary design method
linear genetic programming
IPv6 network flow hashing
IPv6 flow hashing
Internet Protocol
high-speed network systems
high-quality network flow hashing
genetic programming
Cartesian genetic programming
Monitoring
hash algorithms
Hash Function
evolutionary computation
Compositionality
Throughput
computer network
pubcrawl
Sorting
genetic algorithms
Resiliency
Task Analysis
IP networks
1
2
3
next ›
last »