Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption keys
biblio
Efficient Auto key based Encryption and Decryption using GICK and GDCK methods
Submitted by aekwall on Mon, 02/15/2021 - 3:51pm
GICK
Statistics
Sociology
Resiliency
pubcrawl
primary key
Key Genetic Algorithm
key generation
Heuristic algorithms
Hamming distance
artificial intelligence techniques
genetic algorithms
GDCK
encryption keys
efficient encryption
cyber physical systems
Cryptography
Conferences
composability
Biological cells
biblio
Highly Parallel Seedless Random Number Generation from Arbitrary Thread Schedule Reconstruction
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
computerized data
random key generation
unlimited parallelism
universal concern
uniform probability outcomes
trng
threading
revenue source
reconstruction algorithm
random source
random number generator
multiprocessor
highly parallel seedless random number generation
ENT
DieHarder
data sets
Scalability
compare-and-swap operations
Blum-Elias algorithm
arbitrary thread schedule reconstruction
PRNG
Random sequences
encryption keys
private data
random number generation
probability
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Research on End-to-End Security Authentication Protocol of NB-IoT for Smart Grid Based on Physical Unclonable Function
Submitted by aekwall on Mon, 02/17/2020 - 1:17pm
domestic cryptographic algorithm
smart power utilization
SM3
self-controllable NB-IoT application layer security architecture
security authentication protocol
secure data transmission
power network data transmission
power grid business platforms
Physical Unclonable Function
NB-IoT terminals
national strategic hot spot
narrow band internet of things
end-to-end security authentication protocol
electric power business
Scalability
end-to-end security
encryption keys
power engineering computing
Smart Grid
smart grid security
message authentication
smart power grids
Metrics
privacy
pubcrawl
Resiliency
Cryptographic Protocols
Internet of Things
biblio
Improvement in Homomorphic Encryption Algorithm with Elliptic Curve Cryptography and OTP Technique
Submitted by aekwall on Mon, 12/30/2019 - 11:35am
Human Factors
OTP technique
OTP
one time password
homomorphic encryption algorithm
encryption keys
Diffie Hellman key exchange algorithm
customary outsider evaluator
fully homomorphic encryption
Homomorphic encryption
distributed computing
Cloud Computing
Transform coding
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
Memory management
encryption
Servers
Scalability
biblio
Encryption Using Finger-Code Generated from Fingerprints
Submitted by grigby1 on Fri, 03/22/2019 - 11:35am
Fingerprint recognition
smart cards
Scalability
Resiliency
resilience
pubcrawl
minutiae points
minutiae
Metrics
Length measurement
fingerprints
fingerprint ridges
biometric encryption
fingerprint features
fingerprint
finger-code
encryption keys
encryption
Elliptic curve cryptography
Cryptography
cryptographic key generation
biometrics (access control)
biometric key
biblio
A data remanence based approach to generate 100% stable keys from an SRAM physical unclonable function
Submitted by grigby1 on Wed, 05/16/2018 - 12:49pm
random noise
word length 256 bit
TMV scheme
Thermal stability
temporal majority voting
stable keys
stable key generation
SRAM chips
SRAM cells
SRAM cell
SRAM based key generation
SRAM
Resiliency
resilience
remanence
reliable key generation
arrays
pubcrawl
power ramp up times
Physical Unclonable Function
memory size 512 KByte
inherent process mismatch
Hardware
encryption keys
device aging
data remanence based approach
data remanence
Cryptography
Compositionality
Circuit stability
bit masking
biblio
Analysis of ICMetrics Features/Technology for Wearable Devices IOT Sensors
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
key generation
wearables security
Wearable devices
wearable computers
Sports Activity Data
Software
sensors
security
Scalability
Resiliency
resilience
pubcrawl
privacy
online services
Accelerometers
IOT sensors
IoT
Internet of Things
ICmetrics
ICMetric
Human behavior
Hardware
feature extraction
encryption keys
encryption
Cryptography
authentication
Apple Watch
biblio
Database Encryption Using Asymmetric Keys: A Case Study
Submitted by grigby1 on Mon, 04/02/2018 - 11:48am
encryption
web applications
test database
RSA
Resiliency
resilience
pubcrawl
padding
Metrics
Java API
Java
internet
Human behavior
encryption-decryption keys
encryption keys
encryption algorithms
application performance decrease
Encrypted database
ElGamal
ECIES
Distributed databases
Databases
database encryption
Data Security
Cryptography
cryptographic algorithms
Compositionality
Benchmark testing
asymmetric keys
Asymmetric Encryption
application program interfaces
biblio
Physically Unclonable Digital ID
Submitted by grigby1 on Tue, 03/07/2017 - 12:31pm
physically unclonable function
Hash functions
identification of persons
identity management systems
Immune system
mobile hardware security
Optical imaging
Optical sensors
physically unclonable digital ID
encryption keys
pubcrawl170109
PUF
Q-PUDID
quasi-PUDID
random number generation
Servers
two-factor authentication
Access Control
dynamic human identity
digital signatures
digital identity thefts
device authentication
descrambler-hardware authentication
cyber security
Cryptography
cryptanalysis
computer security
Cloning
clonable static information
center for strategic and international studies
biometrics
authorisation
authentication
biblio
An efficient and scalable key management mechanism for wireless sensor networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:38pm
processing overheads
wireless sensor networks
telecommunication security
telecommunication network topology
telecommunication network management
sensors
sensor nodes
security
secure wireless sensor networks
secret sharing techniques
scalable key management mechanism
reduced memory size
public key cryptography
Public key
Base stations
network topology
limited computation capability
large size networks
key management
key distribution schemes
group communications
encryption keys
Elliptic curves
elliptic curve public key encryption
Elliptic curve cryptography
Diffie-Hellman like key exchange
battery-based power supply