Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
transmission process
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
decryption time
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
MQTT protocol
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
computer network security
queueing theory
security mechanism
Payloads
digital signatures
pubcrawl
Resiliency
transport protocols
Protocols
Cryptographic Protocols
security
Memory management
Internet of Things
encryption
digital signature
Scalability
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
key exposure
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
revocation
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
power engineering computing
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
Ciphers
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
biblio
Studied on Application of Double Encryption Algorithm in Covert Channel Transmission
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
intelligent mobile terminal
Transportation
transmission process
telecommunication security
symmetric encryption
smart cities
Security transmission
Scalability
RSA
resilience
mobile terminal data transmission
mobile intelligent terminal
mobile computing
asymmetric encryption algorithm
file transfer
double encryption algorithm
Double encryption
DES
Cryptography
covert transmission
covert channels
covert channel transmission
covert channel
Conferences
Compositionality
Big Data
biblio
Achieving Privacy and Security Using QR Code by Means of Encryption Technique in ATM
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Online banking
triple DES algorithm
transmission process
smart cards
Smart card
Servers
secret filming
secret code
Resiliency
QR codes
QR code
pubcrawl
Personal Identification Number
peeping attack
ATM machine
Mobile Applications
Mobile Application
encoded QR information
DES algorithm
Databases
data privacy
Data Encryption Standard
cyber physical systems
Cryptography
Automated Teller Machine
authorisation
authentication system
authentication