Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
A Lightweight Hash-Chain-Based Multi-Node Mutual Authentication Algorithm for IoT Networks
Submitted by grigby1 on Fri, 08/11/2023 - 12:54pm
Internet of Things
security
pubcrawl
resilience
Resiliency
authentication
Complexity theory
Compositionality
Internet of Things (IoT)
Hash functions
hash algorithms
Mission critical systems
Power supplies
hash chain
biblio
Enhancing the Performance of Hash Function Using Autonomous Initial Value Proposed Secure Hash Algorithm 256
Submitted by grigby1 on Fri, 08/11/2023 - 12:53pm
Hash functions
secure hash function
padding
Key Constant
Initial Value (IV)
hash code
codes
data communication
hash algorithms
security
Python
Compositionality
authentication
Conferences
Resiliency
resilience
pubcrawl
biblio
A Study on Fuzzy Keywords Search Techniques and Incorporating Certificateless Cryptography
Submitted by grigby1 on Mon, 07/31/2023 - 12:26pm
encryption
Cloud Computing
Servers
pubcrawl
Metrics
resilience
Resiliency
Scalability
authentication
maintenance engineering
Keyword search
searchable encryption
Costs
Fuzzy Cryptography
CertificateLess cryptography
Fuzzy keyword search techniques
biblio
A Fuzzy Multi-Identity Based Signature
Submitted by grigby1 on Mon, 07/31/2023 - 12:24pm
pubcrawl
Metrics
resilience
Resiliency
Scalability
authentication
Big Data
public key cryptography
digital signatures
Costs
Fuzzy Cryptography
CDH assumption
Existentially Unforgeable
Fuzzy Identity-based Signature
Multi-Identity
biblio
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
Submitted by grigby1 on Mon, 07/31/2023 - 12:24pm
Cryptography
pseudorandom numbers
Pollard’s ρ
Elliptic curve cryptography (ECC)
Fuzzy Cryptography
Fuzzy logic
Internet of Things (IoT)
Elliptic curve cryptography
Protocols
Internet of Things
authentication
Scalability
Resiliency
resilience
Metrics
pubcrawl
security
biblio
LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach
Submitted by grigby1 on Fri, 07/21/2023 - 1:16pm
Training
security
pubcrawl
policy-based governance
collaboration
Scalability
authentication
Probabilistic logic
resilience
Bayes methods
Resiliency
user experience
false trust
Behavioral sciences
biblio
Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network
Submitted by grigby1 on Thu, 07/20/2023 - 3:15pm
wireless sensor networks
Remote Patient Monitoring (RPM)
patient monitoring
Cuckoo filter
Resiliency
medical devices
expert systems
Privacy-preserving
Wireless communication
pubcrawl
Cloud Computing
Protocols
privacy
authentication
Scalability
resilience
Human behavior
biblio
Security Authentication Scheme for Low Earth Orbit Satellites Based on Spatial Channel Characteristics
Submitted by grigby1 on Fri, 07/14/2023 - 9:49am
pubcrawl
Metrics
resilience
authentication
Software Defined Network
Compositionality
Resistance
Software algorithms
Force
simulation
security authentication
Satellites
Resiliency
channel characteristics
Low earth orbit satellites
encryption audits
biblio
Implementation of Efficient Hybrid Encryption Technique
Submitted by grigby1 on Thu, 07/13/2023 - 11:46am
composability
Asymmetric Encryption
efficient encryption
ECDH
symmetric encryption
Elliptic curves
ECC
Multimedia systems
Elliptic curve cryptography
encryption
Computational modeling
Protocols
authentication
AES
Resiliency
resilience
pubcrawl
biblio
Digital Certificate Authentication with Three-Level Cryptography (SHA-256, DSA, 3DES)
Submitted by grigby1 on Thu, 06/29/2023 - 11:04am
security
pubcrawl
resilience
Resiliency
Scalability
authentication
Cryptography
digital signatures
Three-dimensional displays
Hash functions
digital signature
DSA
Seminars
3DES
SHA-256
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »