Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrity
biblio
Data Security and Privacy using DNA Cryptography and AES Method in Cloud Computing
Submitted by grigby1 on Fri, 05/06/2022 - 9:32am
cloud
Data Security
DNA cryptography
decryption
integrity
Hazards
Data protection
cloud computing security
DNA
Force
encryption
resilience
Metrics
Computers
privacy
Instruments
AES
Resiliency
Human behavior
pubcrawl
biblio
Encryption, File Splitting and File compression Techniques for Data Security in virtualized environment
Submitted by grigby1 on Fri, 04/01/2022 - 12:16pm
Software algorithms
steganography algorithm
Pressure
Decryption Technique
data storage
cloud data
Compression
Secure File Sharing
integrity
Data protection
Steganography
Distributed databases
Encryption technique
Cloud Computing
Decoding
Metrics
encoding
composability
Safety
AES
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
No-Sum IPsec Lite: Simplified and lightweight Internet security protocol for IoT devices
Submitted by grigby1 on Tue, 03/15/2022 - 1:16pm
Cryptography
ESP
Scalable Security
Internet security
integrity
IPsec
Sociology
public key cryptography
Protocols
tools
Scalability
Conferences
pubcrawl
IoT
authenticity
security
Cloud Computing
biblio
VPNoT: End to End Encrypted Tunnel Based on OpenVPN and Raspberry Pi for IoT Security
Submitted by aekwall on Mon, 03/14/2022 - 12:44pm
Predictive Metrics
Router Systems Security
vpnot
vpn
tunnel
Transport Layer Security
Raspberry Pi
OpenVPN
integrity
Costs
Virtual private networks
Logic gates
Media
confidentiality
IoT
Resiliency
pubcrawl
encryption
Linux
authentication
sensors
security
biblio
A Blockchain-Based Approach to Provenance and Reproducibility in Research Workflows
Submitted by aekwall on Fri, 02/25/2022 - 9:48am
Fingerprint recognition
Reproducibility of results
reproducibility
open science
integrity
ethereum
bloxberg
Memory
Provenance
blockchain
Pipelines
Semantics
composability
Human behavior
Resiliency
Metrics
pubcrawl
Scalability
biblio
Integrity and Authentications for service security in vehicular ad hoc networks (VANETs): A Review
Submitted by grigby1 on Tue, 02/08/2022 - 10:40am
Compositionality
RSU
open access
V2V
integrity
manet privacy
human computer interaction
vehicular ad hoc networks
uncertainty
security
VANETs
composability
privacy
authentication
Resiliency
resilience
Metrics
pubcrawl
biblio
Electronics Supply Chain Integrity Enabled by Blockchain
Submitted by Katie Dey on Thu, 10/21/2021 - 10:45am
trust
electronics supply chain
integrity
blockchain
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
man-in-the-middle attack
Signing
sender identity
security
Scalability
Resiliency
public key cryptography
Public key
pubcrawl
private key cryptography
message integrity
message authentication
authentication
integrity
encryption
digital world
digital signatures
digital signature
digital era
cyber-attacks
Cryptography
cryptographic key pairs
confidentiality
Conferences
biblio
Security Threats for Autonomous and Remotely Controlled Vehicles in Smart City
Submitted by grigby1 on Thu, 12/17/2020 - 12:55pm
policy-based governance
traffic engineering computing
threat
telerobotics
Smart City
smart cities
security of data
security graph
security context
security
robot operating systems
Resiliency
resilience
remotely operated vehicles
remotely controlled vehicles
pubcrawl
autonomous controlled vehicles
model
mobile robots
integrity property
integrity
Industrial Control Systems
industrial control
Human Factors
Human behavior
data integrity
cybersecurity threats
cyber
control system security
control engineering computing
AV system
autonomous vehicles
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 9:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures
« first
‹ previous
1
2
3
4
5
6
next ›
last »