Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
Mathematical and Algorithmic Prevention of Biometric Data Leaks
Submitted by grigby1 on Tue, 06/14/2022 - 3:12pm
Identification
industrial plants
automation
biometric authentication
biometrics (access control)
biometric encryption
Random access memory
data storage
Metrics
encryption
Object recognition
authentication
Scalability
Resiliency
resilience
pubcrawl
information security
biblio
A Forensic Methodology for the Analysis of Cloud-Based Android Apps
Submitted by grigby1 on Mon, 06/13/2022 - 3:38pm
security
Servers
pubcrawl
resilience
Resiliency
Scalability
authentication
internet
Big Data
Metrics
Forensics
data acquisition
big data security in the cloud
cloud data
Android devices
tokens
biblio
Arithmetic Circuit Homomorphic Encryption Key Pairing Comparisons and Analysis between Elliptic Curve Diffie Hellman and Supersingular Isogeny Diffie Hellman
Submitted by grigby1 on Thu, 06/09/2022 - 2:41pm
Metrics
supersingular isogeny key exchange
Dragonfly Key Exchange
arithmetic circuit
Human Factors
Asia
Central Processing Unit
Homomorphic encryption
Elliptic curves
pubcrawl
quantum computing
Computers
standards
authentication
Scalability
advanced encryption standard
Resiliency
resilience
biblio
SCKHA: A New Stream Cipher Algorithm Based on Key Hashing and Splitting Technique
Submitted by grigby1 on Thu, 06/09/2022 - 2:37pm
Ciphers
encryption
information security
pubcrawl
resilience
Throughput
authentication
Cryptography
Reliability
Compositionality
hash algorithms
stream cipher
symmetric encryption
Resiliency
Computational efficiency
Key Hashing
biblio
Finding Runtime Usable Gadgets: On the Security of Return Address Authentication
Submitted by grigby1 on Mon, 06/06/2022 - 12:09pm
security
pubcrawl
Resiliency
message authentication
authentication
Runtime
Compositionality
memory security
codes
Return address authentication
reuse attack
Information Reuse
biblio
On Security of Key Derivation Functions in Password-based Cryptography
Submitted by grigby1 on Fri, 05/20/2022 - 4:32pm
encryption
security
pubcrawl
Conferences
authentication
Computer crime
composability
Compositionality
resilience
password
Password-based Cryptography
PBKDF
theoretical cryptography
biblio
Video Watermarking Schemes Resistance Against Tampering Attacks
Submitted by aekwall on Thu, 05/19/2022 - 1:41pm
Watermarking
Human Factors
authentication
pubcrawl
Scalability
Metrics
discrete cosine transforms
Resistance
mechatronics
Discrete Cosine Transform (DCT)
Discrete Fourier Transform (DFT)
Discrete Fourier transforms
Discrete Wavelet Transform (DWT)
discrete wavelet transforms
video watermarking
Tamper resistance
biblio
Multi-Level Authentication Scheme for Improving Privacy and Security of Data in Decentralized Cloud Server
Submitted by grigby1 on Mon, 05/09/2022 - 4:36pm
Resistance
global identifier
Collusion Resistance
cloud server
Attribute authority
user privacy in the cloud
data authentication
Aerospace electronics
Scalability
Cloud Computing
Data Security
data privacy
authorization
authentication
Resiliency
resilience
pubcrawl
biblio
A Secure Communication Protocol between Sensor Nodes and Sink Node in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Fri, 05/06/2022 - 4:33pm
wireless sensor networks
marine data collection
Underwater Networks
underwater acoustic sensor networks
statistical analysis
Scalability
confidentiality
Metrics
Wireless communication
encryption
Protocols
authentication
data integrity
Resiliency
resilience
pubcrawl
security
Data collection
biblio
Development of an Algorithmic Approach for Hiding Sensitive Data and Recovery of Data based on Fingerprint Identification for Secure Cloud Storage
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
Predictive Metrics
encryption audits
cloud storage service
MD5 (Message Digest)
Integrity Auditing
fingerprint identification
3DES (Triple-data Encryption Standard)
data integrity
Three-dimensional displays
security
Fingerprint recognition
Compositionality
Resiliency
pubcrawl
Distributed databases
encryption
authentication
Cloud Computing
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »