Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
theoretical cryptography
biblio
Game Theoretical Approach with Audit Based Misbehavior Detection System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
mobile ad-hoc networks
dynamically shifting nodes
end-to-end encrypted traffic
GAMD
game theoretical approach
incentive based reputation scheme
incentive schemes
MANET environment
misbehaving nodes
misbehavior nodes
continuous packet droppers
multichannel networks
multihop ad hoc networks
node behavior
per-packet basis
selective dropping attacks
selective packet droppers
Selfish node
supervisory game
theoretical cryptography
Routing protocols
Monitoring
pubcrawl
composability
Conferences
game theory
Ad hoc networks
telecommunication security
Peer-to-peer computing
Routing
Games
Cryptography
Compositionality
MANET
mobile ad hoc networks
mobile nodes
AMD
Audit based Misbehavior Detection system
Audit-based Misbehavior Detection
biblio
Cryptographic and Non-Cryptographic Network Applications and Their Optical Implementations
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
optical implementations
theoretical cryptography
signal processing
secret keys
quantum version
quantum theory
quantum optics
quantum optical versions
Quantum mechanics
quantum mechanical signals
quantum key distribution protocols
quantum advantage
prominent examples
Optical pulses
pubcrawl
noncryptographic network applications
mere conceptual value
Communication Systems
classical signal structures
abstract protocols
quantum cryptography
quantum computing
Optical fiber networks
Optical detectors
Compositionality
Fingerprint recognition
Protocols
composability
biblio
Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
AEGIS-128
theoretical cryptography
vanilla RMFA
theoretical round modification fault analysis
theoretical level
Round modification
Fault attack
Ciphers
authenticated encryption
algebraic techniques
Algebraic Fault Analysis
AEGIS-256
authentication
AEGIS
advanced round modification fault analysis
advanced fault analysis
Compositionality
Circuit faults
Cryptography
encryption
Ad hoc networks
composability
pubcrawl
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
linear codes
theoretical cryptography
structural attacks
strong mathematical background
side-channel attacks
public-key cryptosystem
public-key cryptography
post-quantum standardization
Post-quantum cryptography
polynomials
polynomial time
oldest quantum-resistant proposition
number theory problems
number theory
NIST's announcement
McEliece scheme
pubcrawl
elliptic curve
discrete logarithm
coding theory
code-based cryptography
adequate post-quantum cryptographic schemes
quantum cryptography
side-channel analysis
public key cryptography
quantum computer
Decoding
Computers
Compositionality
physical attacks
encryption
composability
biblio
Randomized Composable Coresets for Matching and Vertex Cover
Submitted by grigby1 on Wed, 04/11/2018 - 2:44pm
Computing Theory
composability
Compositionality
distributed computing
mapreduce algorithms
matching
pubcrawl
randomized composable coresets
simultaneous communication complexity
theoretical cryptography
vertex cover
biblio
Bounding Laconic Proof Systems by Solving CSPs in Parallel
Submitted by grigby1 on Wed, 04/11/2018 - 2:43pm
Complexity theory
composability
Compositionality
constraint satisfaction problems
pubcrawl
semidefinite programming
theoretical cryptography
biblio
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing
Submitted by grigby1 on Wed, 04/11/2018 - 2:43pm
composability
Compositionality
multi-party computation
ORAM
privacy-enhancing technologies
pubcrawl
secret sharing
theoretical cryptography
biblio
Applications of Elliptic Curve Cryptography: A Light Introduction to Elliptic Curves and a Survey of Their Applications
Submitted by grigby1 on Wed, 04/11/2018 - 2:43pm
composability
Compositionality
diffie-hellman (DH)
Digital Signature Algorithm (DSA)
Elliptic curve cryptography (ECC)
elliptic curve diffie-hellman (ECDH)
elliptic curve DSA (ECDSA)
pubcrawl
theoretical cryptography
biblio
A Framework for the Cryptographic Enforcement of Information Flow Policies
Submitted by grigby1 on Wed, 04/11/2018 - 2:43pm
Access Control
attribute-based encryption
composability
Compositionality
cryptographic enforcement scheme
Cryptography
information flow policy
key assignment scheme
pubcrawl
theoretical cryptography
biblio
Variance Analysis of Pixel-Value Differencing Steganography
Submitted by grigby1 on Wed, 04/11/2018 - 2:43pm
Adaptive steganography
composability
Compositionality
least significant bit
Pixel-value difference
pubcrawl
theoretical cryptography
Variance analysis
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »