Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message integrity
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
man-in-the-middle attack
Signing
sender identity
security
Scalability
Resiliency
public key cryptography
Public key
pubcrawl
private key cryptography
message integrity
message authentication
authentication
integrity
encryption
digital world
digital signatures
digital signature
digital era
cyber-attacks
Cryptography
cryptographic key pairs
confidentiality
Conferences
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles
Submitted by grigby1 on Thu, 08/13/2020 - 4:21pm
privacy-preserving warning message dissemination
Human Factors
internet
Internet of Things
Internet of Vehicles
lightweight vehicles
message authentication
message integrity
Metrics
Human behavior
pubcrawl
resilience
Resiliency
Scalability
secure privacy-preserving dissemination scheme
vehicular ad hoc networks
verifiable encryption
Access Control
driver privacy issues
data dissemination
cyber physical systems
Cryptography
conditional privacy preservation mechanism
conditional privacy preservation
computer network security
cloud-assisted IoV
cloud-assisted Internet
Cloud Computing
attribute-based message encryption schemes
attribute-based encryption
anonymous vehicle authentication
anonymous messaging
anonymous identity-based signature technique
biblio
Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
message exchange
Service robots
service robot
security
Scalability
RSA algorithm
Resiliency
public key cryptography
Public key
pubcrawl
message transmission
message integrity
cloud
message encryption
message decryption
message authentication
intelligent robots
encryption
digital signatures
digital signature algorithm
digital signature
control engineering computing
cloud intelligent robot
Cloud Computing
biblio
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
Resistance
hash algorithms
permutation
One-way Function
message integrity
message authenticity
cryptographic hash functions
Cryptographic Hash Function
cellular automata based hashing algorithm
cellular automata
CABHA algorithm
Cryptography
Compositionality
digital signature
computer science
automata
finite element analysis
cryptographic applications
message authentication
pubcrawl
Resiliency
information security
biblio
Performance evaluation of an authentication mechanism in time-triggered networked control systems
Submitted by willirn1 on Fri, 05/31/2019 - 10:18am
networked control systems
Vanderbilt
TTEthernet network
TTEthernet
timing behavior
time-triggered networked control systems
Time-Trigger Architectures
time triggered architectures
Synchronization
Switches
security mechanisms
Secure Messages
safety property
reliability property
Receivers
performance evaluation
System-security co-design
network data communication
message integrity
message confidentiality
message authentication
Local area networks
HMAC
hash based message authentication
fault tolerance property
Cryptography
computer network security
computation overhead
communication overhead
authorisation
authentication mechanism
biblio
A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
replay-attack prevention
multi-receiver encryption
mutual authentication
pairing operations
performance evaluations
private key cryptography
pubcrawl
Public key
public key cryptography
Receivers
Metrics
resilience
Resiliency
Scalability
Schnorr
Schnorr-like lightweight identity-based partial private keys
sensitive personal data disclosure prevention
source authentication
Trusted Computing
trusted third party
encryption
android encryption
authentication
decryption
device to device communications
device-generated public keys
disclosure range control
Elliptic curves
embedded Android devices
embedded systems
Android (operating system)
Human behavior
Human Factors
implicit user authentication
Internet of Things
IoT (Internet of Things)
IoT applications
lightweight multireceiver encryption
message authentication
message integrity