Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptology
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
biblio
An Anonymous Attribute-based Access Control System Supporting Access Structure Update
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
policy-based governance
hidden access structures
cloud-based cryptographic system
cloud service provider
anonymous attribute-based encryption
anonymous attribute-based access control system
access structure update
personal data
fine-grained access control
outsourcing
cryptology
Metrics
Cloud Computing
pubcrawl
Human behavior
Resiliency
Proxy re-encryption
data privacy
data owner
attribute-based encryption
data confidentiality
Cryptography
authorisation
Scalability
biblio
Fault tolerant non-linear techniques for scalar multiplication in ECC
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
asymmetric cryptography algorithms
shorter key length
Scalar multiplication point
nonlinear error detection codes
injected faults
faulty results
fault tolerant nonlinear techniques
Fault Tolerant
false information
error detection codes
elliptic curve scalar multiplication point
cryptographic computations
case channel error detection codes
Scalability
cryptology
ECC
Elliptic curve cryptography
security level
public key cryptography
fault tolerant computing
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
encryption
biblio
Threat Extraction in IoT-Based Systems Focusing on Smart Cities
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
smart cities
waste management
threat root causes
threat instances
threat extraction
smart city scenario
IoT-based system
IoT-based services
e-health system
distinct threat types
car parking
Smart City
complex systems
Privacy Threats
security
cryptology
medical information systems
Security analysis
threat extraction method
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Internet of Things
Scalability
computer network security
Threat Modeling
biblio
Investigating the Streaming Algorithms Usage in Website Fingerprinting Attack Against Tor Privacy Enhancing Technology
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
pubcrawl
Website fingerprinting attack
Web sites
Web site fingerprinting attack
traffic analysis attack
Tor
telecommunication traffic
streaming algorithm
statistical flow-based network traffic features
Scalability
Resiliency
representative data stream classification algorithms
concept drift
probability
policy-based governance
pattern classification
online front-ends
Metrics
learning (artificial intelligence)
Human behavior
dynamic Web sites
data privacy
cryptology
biblio
SANUB: A new method for Sharing and Analyzing News Using Blockchain
Submitted by aekwall on Mon, 07/06/2020 - 9:56am
decentralized applications
SANUB
reporter validation
reliable decentralized network
news ownership
news leads
news evaluation
news broadcasting process
News Broadcasting
news agencies
fake news detection
fake news creation
fake news
Scalability
cryptology
text analysis
Web sites
internet
smart contract
blockchain
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
An efficient secret sharing-based storage system for cloud-based IoTs
Submitted by aekwall on Mon, 07/06/2020 - 9:56am
cryptology
threshold secret sharing scheme
secure mass storage systems
secret sharing-based storage system
secret sharing scheme
scalable mass storage systems
IoTs applications
Internet of Things (IoTs)
information architecture
cloud-based IoTs
cloud service providers
cloud service provider
aggregate data
secure environment
Cloud Computing
storage management
Metrics
data aggregation
policy-based governance
pubcrawl
Human behavior
Resiliency
smart devices
Internet of Things
cloud storage
Cryptography
Scalability
biblio
Timing Covert Channels Detection Cases via Machine Learning
Submitted by aekwall on Mon, 07/06/2020 - 9:56am
Scalability
Resiliency
Human behavior
pubcrawl
policy-based governance
Metrics
cryptology
biblio
Analysis of Machine Learning Techniques for Ransomware Detection
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
malware detection
Resiliency
ransomware families
Ransomware
Random Forest
Scalability
pubcrawl
policy-based governance
pattern classification
Metrics
CICAndMal2017 dataset
machine learning-based ransomware detection
machine learning
learning (artificial intelligence)
invasive software
Human behavior
cryptology
computer networks
composability
classification methods
biblio
Ransomware detection using process mining and classification algorithms
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
pattern classification
Resiliency
ransomware detection
ransomware attacks
Ransomware
random forest algorithms
Random Forest
Scalability
pubcrawl
policy-based governance
process model
process mining methods
process mining
Classification algorithms
Metrics
J48
invasive software
Internet users
internet
Human behavior
feature extraction
detection ransomwares
Data mining
cryptology
computing power
composability
« first
‹ previous
1
2
3
4
5
next ›
last »