Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Entropy
biblio
The Best of Both Worlds: Challenges in Linking Provenance and Explainability in Distributed Machine Learning
Submitted by aekwall on Mon, 03/30/2020 - 10:33am
end-to-end explainability
basic transformations
consistent data
data analysis pipeline
data pre-processing steps
data preparation
distributed file system
distributed machine learning
distributed setting
machine learning models
entire data set
explainable machine learning
explainable models
homogeneous data
linking provenance
machine learning experts
single data
Distributed databases
learning (artificial intelligence)
Resiliency
Human behavior
pubcrawl
composability
Computational modeling
Metrics
machine learning
Data models
data analysis
Entropy
Provenance
distributed system
Decision trees
data provenance
distributed computing
biblio
SCR-QRNG: Side-Channel Resistant Design using Quantum Random Number Generator
Submitted by aekwall on Mon, 03/23/2020 - 12:21pm
security primitives
quantum entropy source
Quantum random number generator
radioactive decay
radioactive isotope decay
random frequency clock generator
random masking
random number generators
SCR-QRNG framework
quantum entropy chip
side-channel countermeasures
side-channel leakages
side-channel resistant design
side-channel resistant primitives
side-channel resistant QRNG
unbiased random numbers
random key generation
BSI AIS 31
Scalability
Cryptography
Resiliency
Human behavior
pubcrawl
Metrics
Entropy
random number generation
FPGA
clock frequency modulation
deterministic random bit generator
NIST SP 800-22/90B
PCB module
power side-channel attack and countermeasure
power side-channel attacks
QRNG
biblio
Semi-Finite Length Analysis for Secure Random Number Generation
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
upper bounds
random key generation
STEM
Solids
semifinite length analysis
secure random number generation
secure key generation length
lower bounds
imperfect random numbers
asymptotic expansion
Upper bound
Scalability
set theory
random number generation
Lattices
Entropy
Distribution functions
Metrics
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Analysis of the Noise Source Entropy Used in OpenSSL’s Random Number Generation Mechanism
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
operating systems
random key generation
Unix-like operating systems
TCP-IP layer
security protocol
secure socket layer
real-time clock
OpenSSL random number generation
open source library
noise source entropy
Noise
devrandom
cryptographic random numbers
cryptographic key generation
IP networks
OpenSSL
random number generation
Unix
public domain software
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
transport protocols
Cryptography
Scalability
biblio
A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp
Submitted by aekwall on Mon, 03/23/2020 - 12:20pm
key generation
random key generation
session key generation
repeated random numbers
randomized numbers
random sequence
pseudorandom number generator algorithm
Pseudo-Random Numbers
PRNG seed
PRNG
NIST Test Suite
Linear Congruential Generator algorithm
Linear Congruential Generator
LCG algorithm
Scalability
entropy source epoch timestamp
Random sequences
Authentication schemes
cryptographic algorithm
random number generation
Entropy
Metrics
Cryptography
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
biblio
Methods and Special Processors of Entropy Signal Processing
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
entropy-manipulated signals
Time
theoretical cryptography
theoretical comments
special processors
signal processing
pubcrawl
Program processors
probability
Probabilistic logic
probabilistic entropy
Hardware
estimation
a special processor
entropy signal processing
Entropy
Cryptography
correlation activity
Correlation
Compositionality
composability
Ciphers
cipher signals
cipher signal receivers
and structural complexity
biblio
Image Analysis and Processing in the Encrypted Domain
Submitted by grigby1 on Wed, 03/04/2020 - 3:14pm
image encryption
Transform coding
theoretical cryptography
social networking (online)
signal processing in the encrypted domain
secret image sharing
research project
pubcrawl
privacy
noisy encrypted images
Noise measurement
multimedia security
composability
Image coding
Image analysis
Entropy
encryption phase
encrypted domain
data hiding
data encapsulation
data compression
Cryptography
crypto-compressed image recompression
Compositionality
biblio
Enabling Ubiquitous Hardware Security via Energy-Efficient Primitives and Systems : (Invited Paper)
Submitted by aekwall on Mon, 03/02/2020 - 11:30am
Hardware Security
Ubiquitous Computing Security
ubiquitous hardware security
Thermal stability
security-sensitive applications
random number generators
pufs
power penalty
low-end devices
Low power
HW security
energy-efficient primitives
ubiquitous computing
error correction codes
security
Human Factors
Random access memory
Entropy
attacks
design requirements
Metrics
pubcrawl
Resiliency
power aware computing
attack surface
Hardware
Cryptography
Scalability
biblio
AEH-MTD: Adaptive Moving Target Defense Scheme for SDN
Submitted by grigby1 on Tue, 02/18/2020 - 11:05am
Metrics
source address entropy value
softwaredefined networking
software-defined networking
software defined networking
SDN security
Scalability
Resiliency
resilience
pubcrawl
moving target defense
active network defense
flow rate method
Entropy
end information hopping
distributed denial of service attack
computer network security
antiattack capability
AEH-MTD
adaptive moving target defense scheme
adaptive hopping
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »