Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hash Function
biblio
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Submitted by aekwall on Mon, 02/15/2021 - 4:57pm
NIST
unpredictability properties
statistical testing
security strengths
secure hash function
Scalability
Resiliency
random number generation
random bit generator mechanism
Random Bit Generator
public key cryptography
pubcrawl
pseudorandom bit generators
pseudorandom bit generator mechanism
cryptographic hash functions
Metrics
Hash Function
hard number theoretic problems
Generators
encryption
Elliptic curves
elliptic curve discrete logarithm problem
Elliptic curve cryptography
Electronic mail
derivation function
decryption
cryptographic tasks
biblio
Stateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Bitcoin cryptocurrency
Winternitz one-time signature scheme
stateful hash-based signature schemes
stateful hash-based digital signature schemes
signature verification
Signature Generation
Rivest Shamir Adleman
Post-quantum cryptography
Merkle signature scheme
Lamport one-time signature scheme
Hash-based Digital Signature
elliptic curve digital signature algorithm
discrete logarithm problems
Scalability
Bitcoim
Hash Function
quantum computers
cryptocurrency
security levels
quantum cryptography
quantum computing
digital signatures
cryptocurrencies
pubcrawl
Resiliency
biblio
Slot Assignment Algorithm Based on Hash Function for Multi-target RFID System
Submitted by grigby1 on Fri, 06/12/2020 - 12:09pm
radiofrequency identification
wireless sensor networks
Throughput
telecommunication congestion control
tags collision
Tag matching
Tag group
Stability analysis
Smart tags
slot assignment algorithm
simulation
Resiliency
resilience
ALOHA algorithm
pubcrawl
object detection
Multitarget tags assignment slots algorithm
Multitarget RFID system
Multitag identification technique
Heuristic algorithms
Hash functions
Hash Function
hash algorithms
Compositionality
anti-collision algorithms
Anti-collision
biblio
Supervised Max Hashing for Similarity Image Retrieval
Submitted by grigby1 on Fri, 06/12/2020 - 12:08pm
resilience
hashing
image retrieval
k-ary base
labeled image datasets
learning (artificial intelligence)
mathematically differentiable approximation
nearest neighbor search
pubcrawl
Quantization (signal)
Hash functions
Resiliency
rich feature vectors
Semantics
similarity image retrieval
storage efficiency
supervised hashing methods
supervised max hashing
Training
feature vector generation
-Learning-to-Hash
-Winner-Take-All-Hash-Family
Approximation algorithms
argmax function
Compositionality
convolutional neural nets
convolutional neural networks
deep neural network architecture
feature extraction
-Convolutional-Neural-Networks
file organisation
gradient descent methods
gradient methods
hand-crafted feature vectors
hash algorithm
hash algorithms
hash code
Hash Function
biblio
Implementation of Enhanced Secure Hash Algorithm Towards a Secured Web Portal
Submitted by aekwall on Mon, 06/08/2020 - 11:32am
hash collisions
hash algorithms
web portal
SHA-1
secured web portal
salt generation
salt algorithm
password hashing
matrix encryption key
Internet security
hash tables
hash message
Hash Function
Cryptography
enhanced secure hash algorithm-512
file organisation
Hash functions
Compositionality
Portals
Ciphers
password
web applications
Databases
pubcrawl
Resiliency
encryption
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
A Nobel Cryptosystem for Group Data Sharing in Cloud Storage
Submitted by grigby1 on Wed, 03/18/2020 - 12:28pm
data user
Secure File Sharing
resilience
Resiliency
pubcrawl
security and privacy
private files
private data sharing
mutually established secret key
Hash Function
file identifier
encrypted file
Cryptography
data owner
cryptosystem
cloud storage
cloud service provider
Aggregates
group data sharing
storage management
Servers
data privacy
Cloud Computing
encryption
biblio
Video Steganography by Neural Networks Using Hash Function
Submitted by grigby1 on Mon, 02/10/2020 - 11:44am
neural nets
video steganography
video signal processing
video content
video
telecommunication security
STEM
stego video
steganography detection
Steganography
steganographic techniques
pubcrawl
PSNR
privacy
Neural networks
Artificial Neural Networks
MSE
Metrics
Image Steganography
hybrid neural networks
Hash Function
hash algorithm
hash
discrete wavelet transforms
digital video
Data mining
Cryptography
computer science
composability
biblio
Security and Device Control Method for Fog Computer Using Blockchain
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
blockchain
Data Security
Fog computing
Fog Computing and Security
Hash Function
Internet of Things
composability
Human behavior
Metrics
pubcrawl
Repudiation
resilience
Resiliency
Scalability
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 10:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
« first
‹ previous
1
2
3
next ›
last »