Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Technological innovation
biblio
Implementation of SERPENT cryptographic algorithm for secured data transmission
Submitted by grigby1 on Wed, 05/16/2018 - 1:48pm
key management
Technological innovation
symmetric key
substitution permutation network
SERPENT cryptographic algorithm
SERPENT
secured data transmission
s-box stage
round function
Resiliency
resilience
Repudiation
pubcrawl
Metrics
linear mixing stage
key scheduling
Algorithm design and analysis
IP networks
human factor
Human behavior
graphical programming tool
encryption
enciphering process
decryption
deciphering process
Data Security
data integrity
Cryptography
composability
Ciphers
Blockcipher
biblio
A study of intellectual property protection for mass innovation spaces
Submitted by grigby1 on Tue, 01/23/2018 - 3:21pm
ip protection
Technological innovation
standards
Resiliency
pubcrawl
policy-based governance
Policy
patents
mass innovation space innovative development
Mass Innovation Space
mass entrepreneurship and innovation
Law
collaboration
Intellectual Property Service Standards
Intellectual Property Protection
intellectual property
intellectual cluster management innovation
innovation management
industrial property
industrial economics
Entrepreneurship
economic model
Conferences
composability
biblio
Advanced biometric home security system using digital signature and DNA cryptography
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
home automation
Technological innovation
smart cards
Smart card
Resiliency
pubcrawl
privacy
multifeature biometric traits
Metrics
Medical services
integrated digital signature
Human behavior
advanced biometric home security system
Geo-Detection
DNA cryptography
DNA
digital signatures
digital signature
Cryptography
Conferences
biometrics (access control)
authorisation
authentication
advanced security system
biblio
Review of covert channels over HTTP: Communication and countermeasures
Submitted by grigby1 on Tue, 12/12/2017 - 1:28pm
message content confidentiality
Uniform resource locators
ubiquitous HTTP message
transport protocols
timing
Technological innovation
Servers
Scalability
Resiliency
Receivers
pubcrawl
Protocols
networks
Browsers
internet
HTTP
detection
data leakage
Cryptography
Cryptographic Protocols
covert information container
covert communication method
covert channels
covert channel
Compositionality
capacity
biblio
Cyber security analysis using vulnerability assessment and penetration testing
Submitted by grigby1 on Thu, 04/20/2017 - 12:38pm
Penetration Testing
vulnerability assessment and penetration testing techniques
Vulnerability Assessment and Penetration Testing (VAPT)
vulnerability assessment
VAPT
testing
Technological innovation
technical assets
Sql Injection (SQLi)
security patches
security of data
security loopholes
security
Resiliency
pubcrawl
Browsers
Organizations
Market research
Human behavior
hacking activities
date security measurement
cyber-attacks
cyber threats
cyber security awareness
cyber security analysis
cyber security
Cross-site scripting (XSS)
Cross Site Scripting
Conferences
composability
« first
‹ previous
…
6
7
8
9
10
11
12
13
14