Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
A Quantum Concurrent Signature Scheme Based on the Quantum Finite Automata Signature Scheme
Submitted by aekwall on Mon, 02/08/2021 - 1:45pm
Quantum circuit
Scalability
Resiliency
quantum hash function
quantum finite automata signature scheme
Quantum entanglement
quantum digital signatures
quantum digital signature
quantum cryptography
quantum concurrent signature scheme
quantum concurrent signature
quantum computing security
quantum computing environment
quantum computing
public key cryptography
invertibility
Hash functions
finite automata
digital signatures
Cryptography
concurrent signatures scheme
complex quantum operations
automata
ambiguous signatures
pubcrawl
security
biblio
Detection of Blind Signature Using Recursive Sum
Submitted by aekwall on Mon, 02/08/2021 - 1:45pm
digital signature
recursive sum
digital signature signing process
digital signature security
digital messages
data origin authentication
blinded version
blind source separation
blind signature detection
blind signature
Scalability
RSA
public key encryption
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
private key cryptography
encryption
biblio
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI
Submitted by aekwall on Mon, 02/01/2021 - 11:40am
Public key
digital trust
ethereum
Ethereum blockchain
human interaction
human trust
Internet of Things
PKI model
Protocols
pubcrawl
digital certificates
public key cryptography
public key infrastructure
Public Key Infrastructure model
Servers
trust
trust concerns
trust enhancement
trusted Certificate Authority
automation issue
Resiliency
Scalability
Human behavior
Metrics
ACME
ACME protocol
authorisation
Automated Certificate Management Environment
PKI Trust Models
blockchain
blockchain technology
certificate authority
certificate issuance automation protocol
certification
contracts
conventional security models
current trust issues
biblio
Quantum Homomorphic Encryption Based on Quantum Obfuscation
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
open question
telecommunication security
Scalability
Resiliency
Registers
Quantum point function
quantum obfuscation
Quantum mechanics
quantum homomorphic encryption scheme
Quantum homomorphic encryption
quantum computing security
quantum computation
public key cryptography
quantum computing
Metrics
Logic gates
Human Factors
Homomorphic encryption
encryption operator
encryption
encrypting party
encrypted data
decrypting party
data privacy
pubcrawl
security
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:33am
RSA
work flow
Terminology
public key cryptosystems
public key cryptosystem
Pailier
in-direct rapid homomorphic encryption
homomorphic encryption schemes
homomorphic cryptosystem
ElGamal based algebric homomorphic encryption
crypto-algorithms
Brakerski-Gentry-Vaikuntanathan model
Application of Homomorphic Encryption
Homomorphic encryption
Fog computing
Human Factors
Cloud Computing
edge computing
security threats
False Data Injection
public key cryptography
Data protection
Metrics
privacy
pubcrawl
Resiliency
data encryption
data integrity
encryption
Data Security
Servers
Scalability
biblio
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
QR Code (4)
Instant messaging
Instant messaging (1)
instant messaging application security
message decryption process
message security
Metrics
pubcrawl
public key cryptography
implementation designs
QR code implementation
RSA 2048
Scalability
security
Servers
two factor authentication
two-factor authentication
Two-factor authentication (3)
Electronic mail
resilience
Resiliency
account theft
AES 128
android
android encryption
authentication
confidential messages
QR codes
electronic messaging
encryption
end-to-end encryption
Fingerprint (5)
Fingerprint recognition
Human behavior
hybrid encryption
Hybrid Encryption (2)
biblio
SRVB cryptosystem: another attempt to revive Knapsack-based public-key encryption schemes
Submitted by aekwall on Mon, 01/25/2021 - 12:59pm
mathematical simplicity
knapsack problems
knapsack schemes
knapsack-based asymmetric encryption schemes
knapsack-based cryptography
knapsack-based encryption schemes
Knapsack-based public-key encryption schemes
Lattice Oracle
lattice problems oracle attacks
Knapsack Problem
Merkle-Hellman Cryptosystem
modern telecommunication technology
public-key cryptosystem
Shamir Cryptanalysis
SRVB cryptosystem
Subset Sum Problem
ubiquitous building block
Communications technology
Resiliency
Human behavior
pubcrawl
composability
Cryptography
Metrics
Lattices
public key cryptography
encryption
public-key cryptography
approximation theory
Asymmetric Encryption
algorithmic simplicity
consistent security improvements
Diophantine Approximation
Diophantine approximations based attacks
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
Design of a Cloud Storage Security Encryption Algorithm for Power Bidding System
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
file storage
Tendering and bidding
symmetrical encryption algorithm
symmetric encryption
storage management
Resiliency
public key cryptography
pubcrawl
power system security
power markets
power bidding system
plaintext upload file
Metrics
hybrid encryption method
Human behavior
file upload
AES
file encryption strength
file block
Electricity supply industry
ECC
composability
cloud storage security encryption algorithm
cloud storage files
cloud storage environment
cloud storage
cloud data storage
Cloud Computing
ciphertext file
asymmetric encryption algorithm
Asymmetric Encryption
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »