Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
A Fuzzy Multi-Identity Based Signature
Submitted by grigby1 on Mon, 07/31/2023 - 12:24pm
pubcrawl
Metrics
resilience
Resiliency
Scalability
authentication
Big Data
public key cryptography
digital signatures
Costs
Fuzzy Cryptography
CDH assumption
Existentially Unforgeable
Fuzzy Identity-based Signature
Multi-Identity
biblio
Fast Modular Exponentiation Methods for Public-Key Cryptography
Submitted by grigby1 on Tue, 07/18/2023 - 2:21pm
Raspberry Pi
window method (WM)
public-key cryptosystem (PKC)
Modular exponentiation (ME)
exponentiation
Human Factors
Resiliency
Communications technology
RSA
security
public key cryptography
energy consumption
Complexity theory
Task Analysis
Java
Scalability
resilience
pubcrawl
biblio
Versatile Hardware Framework for Elliptic Curve Cryptography
Submitted by grigby1 on Fri, 07/14/2023 - 2:19pm
Resistance
Side channel hardening
eddsa
Galois fields
Electronic countermeasures
ECDSA
ECDH
public key cryptography
timing
pubcrawl
Elliptic curve cryptography
Scalability
Hardware
FPGA
field programmable gate arrays
Resiliency
resilience
Metrics
biblio
PKI Ecosystem for Reliable Smart Contracts and NFT
Submitted by grigby1 on Fri, 02/03/2023 - 4:27pm
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
PKI
public key infrastructure
digital signature
PKI Trust Models
NFT
Non-fungible Token
public key cryptography
biblio
An Improvement on “CryptCloud$^\textrm+\$$: Secure and Expressive Data Access Control for Cloud Storage”
Submitted by grigby1 on Tue, 12/20/2022 - 6:30pm
public key cryptography
Authority Accountability
abe
auditing
Traceability
revocation
white box cryptography
Mathematics
Electronic mail
encryption
Computer bugs
composability
Access Control
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
A nodal Authentication IoT Data Model for Heterogeneous Connected Sensor Nodes Within a Blockchain Network
Submitted by aekwall on Fri, 09/30/2022 - 1:45pm
Human behavior
nodal authentication
IoT Data Security
Heterogeneous systems
data integrity
Data Security
IoT security
public key cryptography
composability
Data models
Resiliency
Metrics
pubcrawl
Protocols
authentication
data privacy
blockchain
biblio
Performance Analysis of the Quantum Safe Multivariate Polynomial Public Key Algorithm
Submitted by grigby1 on Thu, 07/14/2022 - 5:13pm
Metrics
secure secret exchange
PQC
polynomial root finding
polynomial factoring
Multivariate Polynomial Public Key
MPPK
mathematical models
random key generation
Post-quantum cryptography
public key cryptography
pubcrawl
Java
Benchmark testing
quantum computing
NIST
Scalability
Conferences
Resiliency
resilience
Human behavior
biblio
Speeding Up Encryption on IoT Devices Using Homomorphic Encryption
Submitted by grigby1 on Thu, 06/09/2022 - 1:42pm
Metrics
Somewhat Homomorphic Encryption
Human Factors
fully homomorphic encryption
Home appliances
Homomorphic encryption
statistical analysis
smartphone
public key cryptography
pubcrawl
Portable computers
Computers
Scalability
IoT device
performance evaluation
Conferences
Resiliency
resilience
biblio
A New LWE-based Homomorphic Encryption Algorithm over Integer
Submitted by grigby1 on Fri, 05/20/2022 - 3:32pm
pubcrawl
Additives
composability
Artificial Intelligence
Compositionality
public key cryptography
information science
Transforms
Homomorphic encryption
LWE
Post-quantum cryptography
public-key encryption
theoretical cryptography
biblio
Cryptanalysis and Improvement of Zheng's Signcryption Technique
Submitted by grigby1 on Tue, 04/26/2022 - 1:51pm
Message confidentiality and integrity
Signcryption technique
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Protocols
Performance analysis
Costs
Hash functions
encryption
ElGamal's digital signature
DSS
digital signatures
DHP
cryptographic hash functions
1
2
3
4
5
6
7
8
9
…
next ›
last »