Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key generation
biblio
Cloud Cryptography: User End Encryption
Submitted by grigby1 on Thu, 07/08/2021 - 2:36pm
Google
user privacy in the cloud
user privacy
Scalability
Resiliency
resilience
pubcrawl
Metrics
key generation
Business
encryption
decryption
Cryptography
cloud computing security
Cloud Computing
cloud
Ciphers
biblio
Efficient Auto key based Encryption and Decryption using GICK and GDCK methods
Submitted by aekwall on Mon, 02/15/2021 - 4:51pm
GICK
Statistics
Sociology
Resiliency
pubcrawl
primary key
Key Genetic Algorithm
key generation
Heuristic algorithms
Hamming distance
artificial intelligence techniques
genetic algorithms
GDCK
encryption keys
efficient encryption
cyber physical systems
Cryptography
Conferences
composability
Biological cells
biblio
Secure Data Packet in MANET Based Chaos-Modified AES Algorithm
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
chaotic communication
manet privacy
Wireless Ad-Hoc Networks
secure data packet
safety-sensitive applications
privacy conference meetings
passive attack
open architecture
MANET based chaos-modified AES algorithm
data packets payload
data packet
chaotic
dynamic topology
key generation
AES
Three-dimensional displays
Cryptography
Compositionality
chaos
military applications
telecommunication network topology
mobile ad hoc networks
MANET
Logistics
Metrics
privacy preservation
pubcrawl
Resiliency
telecommunication security
data privacy
encryption
biblio
Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security
Submitted by grigby1 on Fri, 10/30/2020 - 12:15pm
Protocols
lightweight security primitive
lookup table
LUT
machine learning
machine learning (ML)
one-to-one input-output mapping
Physical Unclonable Function
physical unclonable function (PUF)
physical unclonable function-based key sharing
private key cryptography
lightweight key sharing protocols
pubcrawl
PUF-based key sharing method
resource-constrained devices
Ring Oscillator
Scalability
security
security protocols
shared key
silicon physical unclonable function
Table lookup
I-O Systems
battery power
chip fabrication process
chip-unique key
computer network security
copy protection
crossover RO PUF
Cryptographic Protocols
Cryptography
delays
device authentication
authentication
i-o systems security
industry Internet of Things
Internet of Things
interstage crossing structure
Inverters
IoT security
key generation
Key-sharing
learning (artificial intelligence)
biblio
An Approach to Fault Tolerant Key Generation and Secure Spread Spectrum Communiction
Submitted by grigby1 on Fri, 09/04/2020 - 3:25pm
fault tolerant key generation
brute force attacks
Wireless communications
spread spectrum communication
sensor networks
Security parameters
secure spread spectrum communication
Secure Spread Spectrum
mobile ad hoc networks
mobile ad hoc network
level message security
level encryption securities
key generation
group key generation algorithms
Fault tolerant systems
Cryptography
complex Random key generation algorithms
client side encryption
attacks
fault tolerance
Brute Force Attack
AES
policy-based governance
Human Factors
Force
collaboration
pubcrawl
telecommunication security
Wireless communication
Servers
biblio
A Proof of Concept SRAM-based Physically Unclonable Function (PUF) Key Generation Mechanism for IoT Devices
Submitted by aekwall on Mon, 03/23/2020 - 1:21pm
PUF
random key generation
SRAM PUF
SRAM device
SRAM chips
SRAM chip
SRAM
PUF key generation mechanism
Private keys
fuzzy extractors
fuzzy extractor techniques
error correction coding methods
Error analysis
Arduino mega shield
adjustable memory-based PUF
key generation
IoT
error correction codes
physically unclonable functions
Random access memory
authentication
Metrics
pubcrawl
Human behavior
Resiliency
secret keys
private key cryptography
IoT devices
Internet of Things
encryption
Servers
Scalability
biblio
Analysis of Key Randomness in Improved One-Time Pad Cryptography
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
random numbers
random key generation
true random number generator
shuffling algorithm
random keys
Psuedo Random Number Generator
perfect secrecy algorithm
Pearson correlation analysis
one-time pad cryptography
one-time pad
key randomness
key generation
Fisher-Yates shuffling algorithm
Fisher-Yates algorithm
Scalability
OTP
Ciphers
correlation methods
Mice
random number generation
Generators
Prediction algorithms
Metrics
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
biblio
A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp
Submitted by aekwall on Mon, 03/23/2020 - 1:20pm
key generation
random key generation
session key generation
repeated random numbers
randomized numbers
random sequence
pseudorandom number generator algorithm
Pseudo-Random Numbers
PRNG seed
PRNG
NIST Test Suite
Linear Congruential Generator algorithm
Linear Congruential Generator
LCG algorithm
Scalability
entropy source epoch timestamp
Random sequences
Authentication schemes
cryptographic algorithm
random number generation
Entropy
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Physical Layer Key Generation: Securing Wireless Communication in Automotive Cyber-Physical Systems
Submitted by grigby1 on Wed, 11/27/2019 - 2:59pm
Automotive cyber-physical systems
composability
Key exchange
key generation
Metrics
physical layer security
pubcrawl
resilience
Resiliency
symmetric cryptographic algorithm
Wireless communication
biblio
Analysis of ICMetrics Features/Technology for Wearable Devices IOT Sensors
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
key generation
wearables security
Wearable devices
wearable computers
Sports Activity Data
Software
sensors
security
Scalability
Resiliency
resilience
pubcrawl
privacy
online services
Accelerometers
IOT sensors
IoT
Internet of Things
ICmetrics
ICMetric
Human behavior
Hardware
feature extraction
encryption keys
encryption
Cryptography
authentication
Apple Watch
« first
‹ previous
1
2
3
next ›
last »