Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptography
biblio
Library of Fully Homomorphic Encryption on a Microcontroller
Submitted by grigby1 on Fri, 08/11/2023 - 11:30am
Libraries
Metrics
resilience
Resiliency
pubcrawl
Human behavior
Human Factors
Scalability
Cryptography
library
C++ languages
Software algorithms
microcontrollers
Memory
fully homomorphic encryption
Homomorphic encryption
ESP 32 microcontroller
biblio
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
Submitted by grigby1 on Thu, 08/03/2023 - 1:56pm
encryption
pubcrawl
Metrics
resilience
Resiliency
Cryptography
Computational modeling
composability
Public key
Random variables
Noise measurement
black-box reductions
bounded leakage
dense leakage
leakage-resilient cryptography
Forward Error Encryption
biblio
Two-Stage AES Encryption Method Based on Stochastic Error of a Neural Network
Submitted by grigby1 on Thu, 08/03/2023 - 1:56pm
Topology
Forward Error Encryption
Reverse Neural Network Functional Operator
passwords
neural network
Neurons
Prediction algorithms
network topology
composability
encryption
Cryptography
AES
Resiliency
resilience
Metrics
pubcrawl
Training
biblio
A Research on the Selection of Cooperative Enterprises in School-Enterprise Joint Cryptography Laboratory
Submitted by grigby1 on Mon, 07/31/2023 - 1:27pm
Entropy
School enterprise joint laboratory
grey correlation analysis
cryptology
Comprehensive evaluation
Fuzzy Cryptography
entropy weight method
mathematical analysis
Reliability
pubcrawl
Cryptography
Scalability
Analytical models
Indexes
Correlation
Resiliency
resilience
Metrics
biblio
A Classification Method of Power Unstructured Encrypted Data Based on Fuzzy Data Matching
Submitted by grigby1 on Mon, 07/31/2023 - 1:26pm
Classification algorithms
multi-keyword matching
fuzzy matching
Fuzzy Cryptography
searchable encryption
filtering algorithms
data classification
Hash functions
power grids
Servers
Cryptography
Data models
Scalability
Resiliency
resilience
Metrics
pubcrawl
biblio
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
Submitted by grigby1 on Mon, 07/31/2023 - 1:24pm
Cryptography
pseudorandom numbers
Pollard’s ρ
Elliptic curve cryptography (ECC)
Fuzzy Cryptography
Fuzzy logic
Internet of Things (IoT)
Elliptic curve cryptography
Protocols
Internet of Things
authentication
Scalability
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Environmental Condition Monitoring and Decision Making System Using Fuzzy Logic Method
Submitted by grigby1 on Fri, 07/28/2023 - 3:34pm
Metrics
wireless sensor networks
wireless sensor network (WSN)
Temperature sensors
Temperature measurement
security
Resiliency
resilience
pubcrawl
Fuzzy Cryptography
Libelium
Fuzzy logic
Distributed databases
Decision Making
Cryptography
air pollution
advanced encryption standard (AES)
biblio
Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation
Submitted by grigby1 on Tue, 07/18/2023 - 3:22pm
pubcrawl
resilience
Scalability
Cryptography
Resiliency
Hamming weight
Computational efficiency
Human Factors
exponentiation
Miller loop
Pairing based cryptography
STNFS
biblio
Improvement of Final Exponentiation for a Pairing on FK12 Curve and its Implementation
Submitted by grigby1 on Tue, 07/18/2023 - 3:21pm
pubcrawl
resilience
Scalability
Cryptography
Protocols
Computers
Elliptic curves
Identity-based encryption
Resiliency
elliptic curve
Human Factors
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
biblio
On Securing the Communication in IoT Infrastructure using Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 07/14/2023 - 3:18pm
computer architecture
Internet of Things
IoT
pubcrawl
Metrics
resilience
Resiliency
Scalability
Cryptography
Elliptic curve cryptography
software reliability
software quality
Sensitivity
Computational efficiency
Elliptic-curve
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »