Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
Blind Certificate Authorities
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
SMTP servers
public key cryptography
public key registration
resilience
Resiliency
Scalability
SCI protocol
secure channel injection protocols
Secure-Multiparty-Computation
pubcrawl
standard email server implementations
TLS
truly anonymous systems
X.509 Certificate
zero-knowledge certificate
zero-knowledge certificate signing protocol
Zero-knowledge-Proof
Cryptographic Protocols
alice@domain.com
anonymity
anonymous messaging
anonymous proofs
authorisation
authorization
blind certificate authority
certificate binding
account ownership
data privacy
digital signatures
Electronic mail
Gmail
MPC
party encrypted communications
privacy
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
ECC
trusted scheme
SE-Enc
encoding scheme
asymmetric cryptography
Asymmetric Encryption
signature
Internet of Things devices
Compositionality
authenticated encryption
encoding
security requirements
encryption
Elliptic curves
Elliptic curve cryptography
Heuristic algorithms
public key cryptography
message authentication
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Internet of Things
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Asymmetric Encryption
securing multiparty communication
MultiRSA
multiple recipients
Multi-recipient Encryption
lightweight scalable multirecipient asymmetric cryptographic scheme
lightweight AMOUN
high computational cost
group membership changes
dynamic networks
chosen plaintext attack
Chinese remainder theorem
Cathode ray tubes
asymmetric cryptography
communication overhead
encryption
network resources
symmetric cryptography
Compositionality
Security analysis
public key cryptography
Public key
Metrics
privacy
pubcrawl
Human behavior
Resiliency
decryption
Computational efficiency
biblio
Asymmetric Physical Layer Encryption for Wireless Communications
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
quantisation (signal)
Wireless communications
quantized information entropy
private channel
possible eavesdroppers
orthogonal frequency-division multiplexing (OFDM)
cryptographic primitive
constellation confusion degree
complex-domain signals
asymmetric PLE
asymmetric physical layer encryption scheme
Asymmetric Encryption
radio receivers
Wireless communication
wireless channels
encryption
Compositionality
Elliptic curve cryptography
physical layer security
Physical layer
public key cryptography
error statistics
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
telecommunication security
Receivers
biblio
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
elliptic curve ElGamal encryption
chaotic theory
Chosen-plaintext attack
cipher image
crossover permutation
diffusion combined chaos game
DNA sequence
EC-ElGamal
elliptic curve ElGamal cryptography
chaotic index sequence
generated scrambled image
image secure communications
key management problems
novel asymmetric image encryption method
plain-image
potential security problem
SHA-512 hash
symmetric image encryption schemes
Elliptic curves
encryption
Resiliency
Human behavior
pubcrawl
Metrics
DNA
public key cryptography
Elliptic curve cryptography
Cryptography
chaos
chaotic communication
Compositionality
chaotic system
image sequences
Asymmetric Encryption
chaos game
biblio
Hybrid Encryption Algorithm Based on Wireless Sensor Networks
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Compositionality
wireless sensor networks(WSNs)
hybrid encryption algorithm
encryption standard
data compression technology
cipher block
asymmetric/symmetric encryption algorithm
Asymmetric Encryption
elliptic curve encryption
AES
advanced encryption standard
ECC
public key cryptography
data compression
Metrics
wireless sensor networks
pubcrawl
Human behavior
Resiliency
private key cryptography
biblio
Research on Point-To-Point Encryption Method of Power System Communication Data Based on Block Chain Technology
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
asymmetric key encryption
transfer key
public key distribution scheme
power system communication data
point-to-point encryption method
point-to-point encryption
encryption identifier
Design Method
data block
communication data point
communication data encryption methods
communication data content
communication data
block chain technology
encryption
Asymmetric Encryption
Compositionality
power systems
power system stability
blockchain technology
public key cryptography
Public key
Distributed databases
Metrics
pubcrawl
Human behavior
Resiliency
Receivers
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
biblio
IoT Security in Wireless Devices
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Internet of Things
wireless sensor networks
wireless devices
Wireless communication
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
IoT security
IoT
Internet of Things framework
Communication system security
internet
interconnected devices
Human Factors
Human behavior
encryption
Elliptic curve cryptography
ECC (elliptic curve cryptography)
ECC
Conferences
computer network security
composability
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »