Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hash Function
biblio
Analog On-Tag Hashing: Towards Selective Reading As Hash Primitives in Gen2 RFID Systems
Submitted by grigby1 on Thu, 08/23/2018 - 11:49am
Compositionality
pubcrawl
RFID
composability
epcglobal gen2
Hash Function
hash table function
Computing Theory
biblio
Data management and searching system and method to provide increased security for IoT platform
Submitted by grigby1 on Mon, 06/11/2018 - 3:37pm
Peer-to-peer computing
telecommunication security
simulation
signature
Servers
Security Properties
searching system
Scalability
Resiliency
resilience
Public key
pubcrawl
Proof-of-work
Ports (Computers)
blockchain
Named Data Network Security
IP networks
Internet of Things
Human behavior
Hash Function
file organisation
digital signatures
Databases
data management system
data management
data integrity
Cryptography
biblio
"A Mutual Authentication Security RFID Protocol Based on Time Stamp"
Submitted by grigby1 on Thu, 02/23/2017 - 12:03pm
privacy security
time stamps
time stamp
security of data
security authentication protocol
RFID technology
RFID
pubcrawl170105 radiofrequency identification
Protocols
PRNG
authentication
privacy
mutual authentication security RFID protocol
mutual authentication
Hash Function
file organisation
encryption
Databases
Cryptographic Protocols
biblio
"An edge based image steganography with compression and encryption"
Submitted by grigby1 on Mon, 02/13/2017 - 2:01pm
Image coding
stego image distortion
Steganography
secret message
Secret key
pubcrawl170102
private key cryptography
Optical distortion
Media
MATLAB
LZW algorithm
Image edge detection
ART
Hash Function
encryption
embedded secret data
edge detection
edge based image steganography
data hiding capacity
data encryption
data compression
Cryptography
canny edge detector
biblio
A Secure Effective Key Management Scheme for Dynamic Access Control in a Large Leaf Class Hierarchy
Submitted by BrandonB on Wed, 05/06/2015 - 1:51pm
Access Control
Hash Function
Hierarchy
key management
security
Symmetric-key cryptosystem
biblio
HMAC based one t #x0131;me password generator
Submitted by BrandonB on Wed, 05/06/2015 - 11:51am
HMAC
standards
Signal processing algorithms
signal processing
Production
One Time Passwords
one time password production methods
one tıme password generator
message authentication
Keccak digest algorithm
Keccak
authentication
hashing-based message authentication code structure
Hash-Based Message Authentication Code
Hash functions
Hash Function
hash algorithm
fixed length strings
electronic media
Cryptography
Conferences
« first
‹ previous
1
2
3