Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptosystem
biblio
A High Speed Montgomery Multiplier Used in Security Applications
Submitted by grigby1 on Tue, 04/19/2022 - 10:46am
Montgomery multiplier
Table lookup
signal processing security
signal processing
Reverse carry propagate adder
Resiliency
resilience
pubcrawl
privacy
exponentiation
Metrics
Filtering
delays
data communication
cryptosystem
Cryptography
composability
adders
biblio
A Modernistic way for KEY Generation for Highly Secure Data Transfer in ASIC Design Flow
Submitted by grigby1 on Tue, 08/31/2021 - 12:09pm
Metrics
whitening the data
true random number generator
Scalability
Resiliency
resilience
random number generator
random key generation
pubcrawl
Ciphers
Hybrid power systems
Human behavior
Generators
encryption
Data Security
cryptosystem
Communication Systems
biblio
Generation and Distribution Secret Encryption Keys with Parameter
Submitted by grigby1 on Tue, 05/25/2021 - 3:22pm
Human Factors
Workstations
Scalability
Resilient
resilience
Reliability
registration center
public key cryptography
Public key
pubcrawl
Prototypes
parametric algebra
multiplication
Metrics
algebra
Human behavior
exponential
excitation
encryption
distributing
discrete logarithm
cryptosystem
cryptology
cryptographic key
composability
Communication channels
collaboration
biblio
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data
Submitted by grigby1 on Tue, 03/09/2021 - 3:04pm
resilience
multifactor
multimodal
NIST
NIST open source software
open-source software
password-driven methods
pubcrawl
public domain software
recognition
Metrics
Resiliency
Scalability
secure approaches
security
Software
test data
Unibiometric analysis
user authentication methods
cryptosystem
authorisation
Bio-metric
biometric algorithms
biometric authentication method
biometric data
biometrics (access control)
BIOS
Cryptography
authentication
fingerprint
Fingerprint recognition
fuzzy vault
Human behavior
Identification
internal open source utilities
Iris
Iris recognition
biblio
Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
white-box attacks
white box cryptography
white-box attack contexts
wearabledevices
wearable consumer electronic devices
wearable computing
random secret components
random padding
physical nature
low computational power
limited memory
lightweight white box encryption scheme
decryption algorithms
Consumer electronics
Cryptography
cryptosystem
wearable computers
Wearable devices
Context
privacy protection
pubcrawl
Data mining
Metrics
composability
Resiliency
performance evaluation
encryption
biblio
Encryption Based On Multilevel Security for Relational Database EBMSR
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Ciphers
Relational Database
multisecurity level
multilevel security model
Multi level
MLS
encryption algorithm
DBMS
cryptosystem
Bell LaPadula
RC4
AES
DES
relational database security
Cryptography
information technology
relational databases
internet
Databases
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
decryption
encryption
biblio
A Nobel Cryptosystem for Group Data Sharing in Cloud Storage
Submitted by grigby1 on Wed, 03/18/2020 - 12:28pm
data user
Secure File Sharing
resilience
Resiliency
pubcrawl
security and privacy
private files
private data sharing
mutually established secret key
Hash Function
file identifier
encrypted file
Cryptography
data owner
cryptosystem
cloud storage
cloud service provider
Aggregates
group data sharing
storage management
Servers
data privacy
Cloud Computing
encryption
biblio
Prominence Of ECDSA Over RSA Digital Signature Algorithm
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
Human behavior
RSA Digital Signature Algorithm
RSA
Resiliency
resilience
Repudiation
public key cryptography
public key cryptographic algorithms
pubcrawl
non-repudiation
Metrics
composability
handwriting recognition
Elliptical Curve Digital Signature Algorithm
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDLP
ECC
digital signatures
cryptosystem
Conferences
biblio
One to One Identification of Cryptosystem Using Fisher's Discriminant Analysis
Submitted by aekwall on Mon, 08/05/2019 - 10:40am
Resiliency
Human behavior
composability
policy-based governance
Metrics
pubcrawl
feature extraction
Information Assurance
Block Cipher
cryptosystem
Fisher's discriminant analysis
One to One Identification
stream cipher
biblio
A Proposed Security Evaluator for Cryptosystem Based on Information Theory and Triangular Game
Submitted by grigby1 on Mon, 05/20/2019 - 4:29pm
information theoretic security
triangular game
security evaluator
Security Evaluation
Scalability
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
Mathematical model
information theory
Ciphers
Human Factors
Human behavior
Games
game theory
Entropy
cryptosystem security
cryptosystem
Cryptography
composability
collaboration
1
2
next ›
last »