Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptography
biblio
EISec: Exhaustive Information Flow Security of Hardware Intellectual Property Utilizing Symbolic Execution
Submitted by grigby1 on Thu, 09/07/2023 - 3:59pm
Logic gates
security
pubcrawl
policy-based governance
resilience
Resiliency
Hardware
intellectual property
Cryptography
composability
Manuals
Aerospace electronics
biblio
On the Security Properties of Combinatorial All-or-nothing Transforms
Submitted by grigby1 on Fri, 09/01/2023 - 2:22pm
Entropy
weak security
conditional entropy
combinatorial all-or-nothing transform
Human Factors
Transforms
perfect security
Probability distribution
information theoretic security
Upper bound
Compositionality
composability
collaboration
Cryptography
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
information security
biblio
Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
Protocols
Two way authentication
secure authentication
legitimate node
insider attacks
ElGamal encryption
passwords
location awareness
Costs
Resiliency
Elliptic curve cryptography
Policy Based Governance
insider threat
web services
Cryptography
authentication
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
biblio
Blockchain-based identity dicovery between heterogenous identity management systems
Submitted by grigby1 on Thu, 08/17/2023 - 4:39pm
Cryptography
Identity Management model
identity management framework
Identity Discovery
Dynamic Identity Management
distributed ledger
ethereum
smart contracts
identity management systems
Identity management
Organizations
privacy
identity
Scalability
Heuristic algorithms
Resiliency
resilience
Human behavior
pubcrawl
blockchain
biblio
How to Exploit Biham-Keller ID Characteristic to Minimize Data
Submitted by grigby1 on Wed, 08/16/2023 - 3:41pm
Schedules
information security
pubcrawl
resilience
Resiliency
AES
Block Cipher
Cryptography
composability
Complexity theory
IDS
Biham-Keller ID characteristic
impossible differential attack
impossible differential characteristic
SPN cipher
biblio
OSHA: A General-purpose and Next Generation One-way Secure Hash Algorithm
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
Hash Function
Secure hash algorithms
pseudo-random number generator
occupational safety
Algorithms
SHA
attacks
cryptanalysis
information science
hash algorithms
pubcrawl
Hash functions
Resistance
Compositionality
NIST
Cryptography
Generators
Heuristic algorithms
Resiliency
resilience
biblio
Secure Hashing using BCrypt for Cryptographic Applications
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
reliability theory
SHA hashing
Rainbow Attack
MD5 hash
dictionary attack
Blowfish cipher
Bcrypt
passwords
hash algorithms
pubcrawl
Force
Data Breach
Compositionality
Production
Industries
Cryptography
Resiliency
resilience
biblio
Implementation of Rail Fence Cipher and Myszkowski Algorithms and Secure Hash Algorithm (SHA-256) for Security and Detecting Digital Image Originality
Submitted by grigby1 on Fri, 08/11/2023 - 1:55pm
hash algorithms
Rail Fence Cipher
Myszkowski
SHA-256
Rails
Hash Function
digital images
Image resolution
Multimedia systems
Ciphers
Hash functions
Histograms
Compositionality
Cryptography
Resiliency
resilience
pubcrawl
biblio
Rewrite Rules for Automated Depth Reduction of Encrypted Control Expressions with Somewhat Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 11:31am
Nonlinear dynamical systems
torque control
Manipulator dynamics
expression simplification
Resiliency
Software
Scalability
Cryptography
Cybersecurity
Software algorithms
resilience
Homomorphic encryption
Arithmetic circuits
Associative rewrite
depth
encrypted control
pubcrawl
Human behavior
Human Factors
Metrics
biblio
Implementation of Cyber Security for Enabling Data Protection Analysis and Data Protection using Robot Key Homomorphic Encryption
Submitted by grigby1 on Fri, 08/11/2023 - 11:30am
Aerospace electronics
Human Factors
Metrics
resilience
Resiliency
Scalability
Access Control
Cryptography
Computer crime
Cloud Security
Human behavior
Homomorphic encryption
Data protection
RKHEA
SKA
Cloud Computing
information security
cyber security
pubcrawl
1
2
3
4
5
6
7
8
9
…
next ›
last »