Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptography
biblio
Analysis of Encrypted Image Data with Deep Learning Models
Submitted by grigby1 on Tue, 07/12/2022 - 2:23pm
Analytical models
policy governance
cryptology
Knowledge Discovery
Compositionality
Loss measurement
Metrics
Data Security
composability
Cryptography
Resiliency
resilience
pubcrawl
Neural networks
information security
collaboration
Training
deep learning
biblio
A Creation Cryptographic Protocol for the Division of Mutual Authentication and Session Key
Submitted by grigby1 on Tue, 07/12/2022 - 2:23pm
Cryptographic Protocols
authentication and session key
policy governance
cryptology
Algorithm
Asymmetric
Communications technology
information science
standards
Compositionality
Cryptography
Metrics
composability
authentication
Safety
Resiliency
resilience
pubcrawl
Monitoring
collaboration
biblio
Detecting Cryptojacking Traffic Based on Network Behavior Features
Submitted by grigby1 on Tue, 07/12/2022 - 2:09pm
feature extraction
pubcrawl
Human behavior
Resiliency
Hardware
privacy
Cryptography
telecommunication traffic
Metrics
resilience
botnet
cryptojacking
Inspection
ma-chine learning
network traffic behavior
biblio
Formalization of the Secrecy Capacity in Non-degraded Wiretap Channel
Submitted by aekwall on Fri, 07/01/2022 - 8:48am
Cryptography
Protocols
Wireless communication
pubcrawl
Metrics
Resiliency
composability
computer security
Communication system security
physical layer security
Channel models
information theory
channel coding
Formalization
secrecy capacity
biblio
Skew-Tent Map Based CMOS Random Number Generator with Chaotic Sampling
Submitted by grigby1 on Thu, 06/30/2022 - 4:05pm
Immunity testing
switched-capacitor
skew-tent map
sampling methods
PL1D maps
discrete-time chaotic maps
chaotic sampling
Bit rate
random number generator
Semiconductor device modeling
chaotic cryptography
Cryptography
Power demand
Interference
integrated circuit
Metrics
NIST
Scalability
Resiliency
resilience
pubcrawl
file
New Approaches for Large Scale Secure Computation
Submitted by JasonGigax on Wed, 06/22/2022 - 2:35pm. Contributor:
Arkady Yerukhimovich
Project Highlight Slides
Applied cryptography
Cryptography
theory
1955264
1955319
1955620
SaTC PI Meeting 2022
file
SaTC: CORE: Small: Collaborative: Hardware-assisted Plausibly Deniable System for Mobile Devices
Submitted by JasonGigax on Wed, 06/22/2022 - 2:35pm. Contributor:
Weisong Shi
Project Highlight Slides
Applied Hardware Security Architecture Systems
Cryptography
CNS-1928331
CNS-1928349
SaTC PI Meeting 2022
file
CAREER: Concrete Hardness in Lattice-based Cryptography
Submitted by JasonGigax on Wed, 06/22/2022 - 2:34pm. Contributor:
Shi Bai
Project Highlight Slides
Applied cryptography
Cryptography
theory
2044855
SaTC PI Meeting 2022
file
SaTC:TTP:Medium:Collaborative: Deployment-quality and Accessible Solutions for Cryptography Code Development
Submitted by JasonGigax on Wed, 06/22/2022 - 2:31pm. Contributors:
Danfeng Yao
Barton Miller
Na Meng
Project Highlight Slides
Applied Software Systems
Cryptography
Transition to Practice
1929701
SaTC PI Meeting 2022
file
A Broad Treatment of Privacy in Blockchains
Submitted by JasonGigax on Wed, 06/22/2022 - 2:31pm. Contributors:
Alessandra Scafuro
Foteini Baldimtsi
Project Highlight Slides
Applied
Applied cryptography
Cryptography
Theory Privacy
1717067
1764025
SaTC PI Meeting 2022
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »