Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resistance
biblio
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
Resistance
hash algorithms
permutation
One-way Function
message integrity
message authenticity
cryptographic hash functions
Cryptographic Hash Function
cellular automata based hashing algorithm
cellular automata
CABHA algorithm
Cryptography
Compositionality
digital signature
computer science
automata
finite element analysis
cryptographic applications
message authentication
pubcrawl
Resiliency
information security
biblio
Application Specific Integrated Gate-Drive Circuit for Driving Self-Oscillating Gallium Nitride Logic-Level Power Transistors
Submitted by grigby1 on Fri, 04/24/2020 - 4:08pm
Power transistors
gate-driver functional behaviour
high-speed floating level-shifter
high-voltage transistors
III-V semiconductors
integrated complementary metal-oxide-semiconductor gate-drivers
logic-level power transistors
low-power electronics
MOSFET
package bondwire connections
parallel LC resonant tank
parasitic capacitance
PCB
power density
gate-driver
printed circuit design
prototype printed circuit board design
reset circuitry
Self-oscillating
self-oscillating gallium nitride
self-oscillating gate-drive
switch-mode power supplies
switched mode power supplies
Switching circuits
wide band gap semiconductors
wide bandgap power semiconductors
oscillating behaviors
ASIC
pubcrawl
resilience
Resiliency
privacy
composability
integrated circuit design
Metrics
Resistance
CMOS integrated circuits
Analog integrated circuit
application specific integrated circuits
application specific integrated gate-drive circuit
Logic gates
capacitance 56.7 pF
class-E resonant inverter
CMOS gate-drivers
driver circuits
electrostatic discharge
electrostatic discharge diode
Electrostatic discharges
ESD diode
fabricated gate-driver
gallium compounds
gan
gate drive technologies
biblio
Design of a Chaotic Oscillator based Model Building Attack Resistant Arbiter PUF
Submitted by grigby1 on Fri, 04/24/2020 - 12:02pm
PUF
Monte Carlo analysis
Monte Carlo methods
oscillating behaviors
oscillating systems
Oscillators
physical unclonable functions
privacy
pubcrawl
Modeling Attacks
PUF architecture
resilience
Resiliency
Resistance
security
security of data
Unclonability
arbiter PUF
Metrics
Measurement
Mathematical model
learning (artificial intelligence)
Integrated circuit modeling
FPGA
field programmable gate arrays
Cryptography
conventional machine learning
composability
Chua's oscillator circuit
Chua's Oscillator
chaotic oscillator
chaotic behaviour
chaos
biblio
Analyzing the Browser Security Warnings on HTTPS Errors
Submitted by grigby1 on Fri, 04/17/2020 - 10:45am
Error analysis
Resistance
browser behaviors
browser defects
browser security warnings
certificate verification
certification
common HTTPS errors
cryptographic algorithm
Compositionality
HPKP
HSTS
name validation
Phase change materials
secure connections
secure Web applications
valid certificate chain
Web Browser Security
internet
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
data confidentiality
telecommunication security
data privacy
Cryptography
composability
encoding
programming
online front-ends
error correction codes
Metrics
Reliability
biblio
Code-based Pseudorandom Generator for the Post-Quantum Period
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
“Provable”
resilience
security model
Resistance
Random sequences
Periodic Properties
Fischer-Stern Generator
Cryptographically Resistance Pseudorandom Sequences
Code-based Pseudorandom Number Generator
pubcrawl
provable security
Compositionality
Decoding
Metrics
Prototypes
Cryptography
Generators
Resiliency
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
cryptographic algorithms
reviewed protocols
Resistance
relatively old Lamport's hash-chain protocol
one-time passwords
one-time password
information technologies
e-commerce
complicated protocols
two factor authentication
two-factor authentication
Authentication Protocols
electronic commerce
Servers
protocol
Human Factors
Phishing
Fingerprint recognition
authentication
message authentication
Vulnerability
Cryptography
pubcrawl
information security
Cryptographic Protocols
biblio
Enhancing Sampling and Counting Method for Audio Retrieval with Time-Stretch Resistance
Submitted by grigby1 on Mon, 01/21/2019 - 12:27pm
LSH
turning point alignment method
Turning
time-stretch resistance
time-stretch
state-of-the-art methods
state-of-the-art audio retrieval method
Sampling and Counting Method
retrieval performance
Resists
Resistance
Resiliency
pubcrawl
Philips-like fingerprints
noise distortions
massive audio dataset
Acoustic Fingerprints
information retrieval
Indexes
ideal audio retrieval method
Human behavior
Fingerprint recognition
fingerprint matching
Filtering
distortion
composability
audio track
audio signal processing
audio retrieval
audio fingerprint
Acoustic signal processing
biblio
Rethinking the High Capacity 3D Steganography: Increasing Its Resistance to Steganalysis
Submitted by grigby1 on Tue, 05/01/2018 - 11:33am
Mathematical model
Three-dimensional displays
stereo image processing
steganography detection
Steganography
steganalysis
shape distortion
Resistance
pubcrawl
privacy
Metrics
3D shape
Information hiding
Image edge detection
high capacity 3D steganographic method
Hamiltonian path quantization
Face
distortion
Data mining
composability
3D steganography
biblio
The Evaluation of the Cryptographic Strength of Asymmetric Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 12:48pm
Elliptic curves
Supercomputers
RSA algorithm
Resistance
Resiliency
resilience
pubcrawl
Metrics
method
Human behavior
GOST R 34.10-2001 algorithm
encryption
Algorithm design and analysis
durability
Cryptography
cryptographic strength
computer technology
Compositionality
Clustering algorithms
asymmetric encryption algorithms
asymmetric encryption algorithm
Asymmetric Encryption
Assessment
biblio
Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
Reactive power
verification tool
transport protocols
tools
Theorem Proving
standards
standard Transport Layer Security handshake
security protocols
security of data
security
Resistance
relative soundness result
algebra
pubcrawl
Protocols
proof assistants
proof argument
pen-and-paper proof
Isabelle/HOL
Isabelle-HOL security
formal verification
constraint-based approach
Compositionality
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »