Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptography
biblio
R-Chain: A Universally Composable Relay Resilience Framework for Smart Grids
Submitted by aekwall on Fri, 08/12/2022 - 3:53pm
authentication
automation
composability
Cryptography
Key derivation
performance evaluation
Protocols
pubcrawl
Ransomware
relay resilience
Smart Grids
universal composability
biblio
A New Evolutionary Computation Framework for Privacy-Preserving Optimization
Submitted by grigby1 on Wed, 08/10/2022 - 2:46pm
Neural networks
Artificial Intelligence
pubcrawl
privacy
Cryptography
composability
Compositionality
evolutionary computation
computational intelligence
Linear programming
scheduling
Processor scheduling
privacy preserving optimization problem
rank-based cryptographic function
biblio
A Survey on Advanced Schemes applied within Trusted Platform modules (TPM) and IaaS in cloud computing
Submitted by grigby1 on Thu, 08/04/2022 - 5:04pm
user interfaces
trusted platform modules
Software Levels. Cryptographic Techniques
Issues
Atmosphere
Phase measurement
Solids
IaaS
tpm
security
cloud computing security
composability
authorization
Cryptography
Resiliency
resilience
pubcrawl
biblio
Applied Cryptography in Network Systems Security for Cyberattack Prevention
Submitted by grigby1 on Tue, 08/02/2022 - 4:20pm
Applied cryptography
Cryptography
encryption
fabrication
Hash functions
Interception
Interruption
modification
network security
pubcrawl
Public key
resilience
Resiliency
RSA
Trustworthy Systems
Virtual private networks
biblio
The Influence of Mobile Operating Systems on User Security Behavior
Submitted by grigby1 on Fri, 07/29/2022 - 5:14pm
operating systems
User behavior
technology threat avoidance theory
Stakeholders
Resiliency
resilience
pubcrawl
privacy
Operating systems security
iOS Security
operating system
Mobile Security
ios
Cryptography
Conferences
appraisal
android
biblio
A Private Statistic Query Scheme for Encrypted Electronic Medical Record System
Submitted by grigby1 on Fri, 07/29/2022 - 4:49pm
Access Control
outsourced database security
statistic query
data outsourcing
searchable encryption
differential privacy
Histograms
Metrics
Databases
pubcrawl
data privacy
Cryptography
privacy
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
Twine: An Embedded Trusted Runtime for WebAssembly
Submitted by grigby1 on Fri, 07/29/2022 - 4:48pm
Runtime
outsourced database security
sqlite
outsourcing
SGX
Webassembly
TEE
Runtime environment
Metrics
C++ languages
Libraries
security
Databases
Cryptography
privacy
Scalability
Hardware
Software
Resiliency
resilience
Human behavior
pubcrawl
biblio
Method for Increasing the Accuracy of the Synchronization of Generation Random Sequences Using Control and Correction Stations
Submitted by grigby1 on Thu, 07/14/2022 - 6:14pm
Receivers
satellite navigation system
Quantum random number generator
operational control segment
cryptographic standards
correcting stations
control information
Post-quantum cryptography
random key generation
Synchronization
Software algorithms
pubcrawl
Metrics
control systems
Cryptography
Scalability
Generators
Software
Resiliency
resilience
Human behavior
biblio
A Modified Key Generation Scheme of Vigenère Cipher Algorithm using Pseudo-Random Number and Alphabet Extension
Submitted by grigby1 on Thu, 07/14/2022 - 6:13pm
Ciphers
encryption
pubcrawl
Human behavior
resilience
Resiliency
Generators
Scalability
Cryptography
integrated circuits
Metrics
key generation
random key generation
and Decryption
Polyalphabetic Cipher
Vigenère Algorithm
biblio
A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model
Submitted by aekwall on Thu, 07/14/2022 - 4:19pm
Cryptography
security
tools
Sociology
Statistics
encryption
Metrics
Resiliency
composability
Ransomware
detection
Adaptation models
pubcrawl
Crypto-Ransomware
pre-encryption
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »