Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resistance
biblio
Implementation of randomize-then-combine constructed hash function
Submitted by BrandonB on Wed, 05/06/2015 - 11:58am
Message systems
Vectors
Resistance
randomize-then-combine technique
randomize-then-combine
Random access memory
programming
parallel multithreaded programming
pair block chaining
multi-threading
block-by-block message processing
Merkle-Damgard construction
Iterative methods
iterative hash function
incremental hash function
Hash function implementation
hash function construction
Educational institutions
Cryptography
biblio
A Power Mask based audio fingerprint
Submitted by BrandonB on Mon, 05/04/2015 - 12:11pm
1f noise
audio fingerprint
audio signal processing
Bit error rate
Databases
fingerprint bits
music
Music Recognition
noise resistance
Power Mask
Resistance
Robustness
Signal to noise ratio
weight matrix
biblio
A New Code Obfuscation Scheme for Software Protection
Submitted by BrandonB on Fri, 05/01/2015 - 7:57am
malicious reverse engineering
tampering
systems re-engineering
software protection
software engineering
Software
security attacks
reverse engineering
Resists
Resistance
nontrivial code clones
Cloning
Licenses
IT industry
Data processing
Computer crime
Complexity theory
code transformation
code patterns
code obfuscation scheme
code fragment cloning
biblio
Detection of duplicated regions in images using 1D-Fourier transform
Submitted by BrandonB on Fri, 05/01/2015 - 7:57am
frequency domain
user friendly image editing software
tampering technique
Resistance
overlapping blocks
JPEG compression attacks
image recognition
image modification techniques
Image coding
high quality imaging hardware
Gaussian blurring
frequency-domain analysis
1D-Fourier transform
Fourier transforms
Fourier transform
feature vector similarity
feature extraction algorithm
feature extraction
duplicated region detection
digital mediums
digital images
Copy move forgery
copy move forged region detection
authentication
biblio
Con-Resistant Trust for Improved Reliability in a Smart-Grid Special Protection System
Submitted by BrandonB on Fri, 05/01/2015 - 7:38am
power system reliability
variance statistical model
untrustworthy protection system
trust assessments
Time-frequency Analysis
statistical analysis
special protection systems
special protection system
smart power grids
Smart Grids
Smart Grid
situational awareness
Resistance
reputation-based trust
Con-resistant trust
Power system protection
Peer-to-peer computing
modern information technology
malicious protection system
malfunctioning protection system
Load modeling
improved reliability
Government
Generators
frequency readings
critical infrastructure
con-resistant trust mechanism
biblio
Formalizing Anonymous Blacklisting Systems
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
mail servers
trust assumptions
service providers
service provider
Resistance
Relays
real-world adoption
Protocols
privacy-enhanced revocation
privacy properties
privacy enhancing technologies
privacy
abusive anonymous users
IRC networks
internet
formalizing anonymous blacklisting systems
computer network security
authentication
anonymous revocation systems
anonymous communications networks
anonymous blacklisting systems
anonymous blacklisting
anonymity
« first
‹ previous
…
4
5
6
7
8
9
10
11
12