Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption
biblio
FPGA based High Throughput Substitution Box Architectures for Lightweight Block Ciphers
Submitted by aekwall on Fri, 03/03/2023 - 10:58am
security
FPGA
computer architecture
Medical services
encryption
pubcrawl
Scalability
Resiliency
Throughput
Ciphers
Generators
cyber-physical systems
Lightweight Ciphers
resource constrained devices
RFID
substitution box
biblio
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher
Submitted by aekwall on Fri, 03/03/2023 - 10:58am
privacy
encryption
pubcrawl
Scalability
Resiliency
side-channel attacks
Ciphers
cyber-physical systems
electromagnetic analysis
Electromagnetic scattering
electromagnetic side-channel analysis
Hazards
Lightweight cryptology
PRESENT Cipher
Lightweight Ciphers
biblio
Evaluating the Performance of Lightweight Block Ciphers for Resource-Constrained IoT Devices
Submitted by aekwall on Fri, 03/03/2023 - 10:57am
Power demand
Lightweight Ciphers
Cipher
lightweight cryptography
Costs
Memory management
Arduino
Random access memory
cyber-physical systems
Internet of Things
Ciphers
Throughput
Resiliency
Scalability
pubcrawl
encryption
performance evaluation
biblio
An Empirical Study on the Quality of Entropy Sources in Linux Random Number Generator
Submitted by grigby1 on Fri, 03/03/2023 - 9:22am
composability
entropy sources
random number generators
Linux Operating System Security
communication security
resilience
Compositionality
cognition
Linux
encryption
estimation
Entropy
Generators
Conferences
Resiliency
Metrics
pubcrawl
biblio
Cryptographic Data Security for IoT Healthcare in 5G and Beyond Networks
Submitted by grigby1 on Tue, 02/28/2023 - 5:50pm
IoT security
end-to-end
Costs
networks
Healthcare
5G
encryption
edge computing
decryption
composability
Prototypes
Cybersecurity
Internet of Things
Medical services
5G mobile communication
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
privacy
biblio
A Review of Android and iOS Operating System Security
Submitted by grigby1 on Fri, 02/17/2023 - 5:11pm
ios
privacy threat
mobile device security
memory randomization
isolation
application sandboxing
policy governance
sandboxing
Memory
Mobile communication
encryption
android
operating systems
Mobile Applications
composability
pubcrawl
security
Organizations
collaboration
biblio
A Secure and Efficient Analytical Encryption Method for Industrial Internet Identification based on SHA-256 and RSA
Submitted by aekwall on Fri, 02/17/2023 - 10:50am
Resiliency
Safe Coding
identification analysis
coding
mechatronics
codes
Dictionaries
policy-based governance
encoding
security
Metrics
pubcrawl
Public key
Secret key
encryption
Human Factors
information security
biblio
Re-Encryption Model for Multi-Block Data Updates in Network Security
Submitted by aekwall on Fri, 02/17/2023 - 10:50am
Data visualization
Safe Coding
Update Code Online Data Reconstruction
revocation
re-encryption
cloud storage
Advanced Encryption Standards
data centers
codes
Data models
policy-based governance
network security
Resiliency
Metrics
pubcrawl
encryption
Cloud Computing
Human Factors
biblio
Scalable and Adaptable End-To-End Collection and Analysis of Cloud Computing Security Data: Towards End-To-End Security in Cloud Computing Systems
Submitted by grigby1 on Mon, 02/13/2023 - 2:59pm
Internet-scale Computing Security
authentication
Cloud Computing
Costs
Data Security
encryption
Memory
parallel processing
pubcrawl
Scalability
Scalable Security
scalable verification
security
Stakeholders
biblio
A Novel Distributed CA System Based on Blockchain
Submitted by grigby1 on Fri, 02/03/2023 - 5:27pm
Scalability
secret key homomorphism of elliptic encryption algorithm
distributed CA
CPK
PKI Trust Models
blockchains
distributed storage
smart contracts
blockchain
encryption
Heuristic algorithms
Resiliency
resilience
Metrics
Human behavior
pubcrawl
non-repudiation
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »