Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
Code-Based Schemes for Post-Quantum Digital Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Complexity theory
quantum security
post-quantum digital signatures
electronic digital signature
code-based schemes
code-based cryptography
CFS scheme
quantum computing
Post-quantum cryptography
Scalability
quantum cryptography
public key cryptography
Public key
digital signatures
Decoding
pubcrawl
Resiliency
digital signature
biblio
A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
bilinear pairings
strong designated verifier
signer ambiguity
signature length
random oracle model
public key system
nontransferability
group-oriented strong designated verifier signature scheme
group-oriented
GO-SDVS scheme
constant-size signatures
constant-size
Scalability
adaptive chosen-message attacks
Oceans
computer science
handwriting recognition
public key cryptography
Public key
digital signatures
Generators
pubcrawl
Resiliency
digital signature
biblio
Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
message exchange
Service robots
service robot
security
Scalability
RSA algorithm
Resiliency
public key cryptography
Public key
pubcrawl
message transmission
message integrity
cloud
message encryption
message decryption
message authentication
intelligent robots
encryption
digital signatures
digital signature algorithm
digital signature
control engineering computing
cloud intelligent robot
Cloud Computing
biblio
Integrate Dragonfly Key Exchange (IETF - RFC 7664) into Arithmetic Circuit Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
public keys
RFC7664
integrate dragonfly key exchange
implementation method
Fast Fully Homomorphic Encryption
Dragonfly Key Exchange
arithmetic circuit homomorphic encryption
arithmetic circuit
ACHE
Private keys
advanced encryption standard
Scalability
Homomorphic encryption
Human Factors
authentication
public key cryptography
Metrics
pubcrawl
Resiliency
private key cryptography
key size
biblio
Multi-Mediated Semi-Quantum Key Distribution
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
Protocols
telecommunication security
standards
shared secret key
Servers
semiquantum users
semiquantum key distribution protocol
security
Scalability
Resiliency
resilience
quantum noise
quantum cryptography
public key cryptography
pubcrawl
adversarial quantum server
private key cryptography
policy-based governance
multimediated SQKD protocol
multimediated semiquantum key distribution
Metrics
information theoretic security analysis
information theoretic security
Human Factors
Human behavior
Gain measurement
fully-quantum
Cryptographic Protocols
Companies
arbitrary MM-SQKD protocols
biblio
Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
source coding
pubcrawl
public channel
public key cryptography
Relays
resilience
Resiliency
Scalability
secret keys
security
policy-based governance
source coding scheme
source sequences
source-type model
telecommunication security
Telecommunications
trusted helper
untrusted helper
Upper bound
Indexes
cooperative communication
cooperative key generation
cooperative two-key generation
Decoding
discrete memoryless sources
five-terminal system
generated keys
Human behavior
Human Factors
channel capacity
information theoretic security
information-theoretic security
key capacity region
key leakage rate
Metrics
partial-trusted helpers
passive eavesdropper
physical layer security
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
An RSA Based Authentication System for Smart IoT Environment
Submitted by aekwall on Mon, 04/06/2020 - 10:16am
security services
X.509 Certificate
smart IoT environment
smart city apps
RSA based authentication system
remote applications
proxy induced security service provider
protocol design
Intelligent Proxies
Challenge/response Protocol
cyber physical systems
Smart City
Authentication schemes
PKI Trust Models
public key infrastructure
RSA
Scalability
IoT security
public key cryptography
authentication
NIST
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
authorisation
Servers
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »