Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
digital signatures
biblio
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks
Submitted by grigby1 on Thu, 03/04/2021 - 1:55pm
Anomaly Detection
composability
computer network security
defense
digital signatures
encoder-decoder recurrent neural network
existing signature-based WAF
existing WAF
Firewalls (computing)
Hidden Markov models
historical Web requests
internet
Metrics
pubcrawl
real-time detection
Recurrent neural networks
resilience
Resiliency
security of data
Semantics
Syntactics
web security
widely-deployed signature-based Web Application Firewalls
Zero day attacks
zero-day attack request
Zero-day attacks
zero-day Web attacks
ZeroWall
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
computer network security
Scalability
digital signature
encryption
Internet of Things
Memory management
security
Cryptographic Protocols
Protocols
transport protocols
Resiliency
pubcrawl
digital signatures
Payloads
security mechanism
queueing theory
MQTT protocol
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
decryption time
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
Elliptic curve cryptography
pubcrawl
Scalability
Resiliency
Metrics
authentication
BB84
Cloud Computing
Cryptographic Protocols
data exchange
digital signatures
elliptic curve
elliptic curve digital signature
elliptic curve digital signature algorithm (ECDSA)
Elliptic curves
malicious client
public key cryptography
quantum computing
Quantum Key Distribution
Receivers
secure cloud data communication
biblio
Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin Transactions
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
Computer crime
Scalability
encryption
security
Cryptographic Protocols
Resiliency
pubcrawl
bitcoin
Cryptography
cryptocurrencies
digital signatures
public key cryptography
cryptocurrency
Elliptic curves
Computers
verification time
Comparative Analysis
Post-quantum cryptography
Signature Generation
signature verification
public key cryptosystems
bitcoin transaction security
Bitcoin transactions
classical algorithms
creating digital signatures
cryptographic systems security
current day algorithms
ECDSA key generation
Hash-based Signature Schemes
hash-based signatures
MSS Key generation
post-quantum digital Signature algorithms
RSA key generation
time 0.001 s
time 0.002 s
time 0.004 s
time 0.0164 s
time 0.0187 s
time 0.0778 s
time 0.1378 s
time 0.2012 s
time 13.494 s
time 16.29 s
time 17.474 s
time 2.0E-4 s
W-OTS key generation
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
authentication
Conferences
confidentiality
cryptographic key pairs
Cryptography
cyber-attacks
digital era
digital signature
digital signatures
digital world
encryption
integrity
man-in-the-middle attack
message authentication
message integrity
private key cryptography
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
security
sender identity
Signing
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
Scalability
digital signature
Cryptography
decryption
private key cryptography
Receivers
information security
network security
Resiliency
pubcrawl
Image coding
Image color analysis
message authentication
digital signatures
encryption
Public key
public key cryptography
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
cover image
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
biblio
A Quantum Concurrent Signature Scheme Based on the Quantum Finite Automata Signature Scheme
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Scalability
security
Resiliency
pubcrawl
Cryptography
digital signatures
public key cryptography
quantum computing
quantum cryptography
automata
finite automata
Hash functions
Quantum entanglement
ambiguous signatures
complex quantum operations
concurrent signatures scheme
invertibility
Quantum circuit
quantum computing environment
quantum concurrent signature
quantum concurrent signature scheme
quantum digital signature
quantum digital signatures
quantum finite automata signature scheme
quantum hash function
biblio
Detection of Blind Signature Using Recursive Sum
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Scalability
encryption
private key cryptography
Resiliency
pubcrawl
digital signatures
public key cryptography
Elliptic curve cryptography
public key encryption
RSA
digital signature
blind signature
blind signature detection
blind source separation
blinded version
data origin authentication
digital messages
digital signature security
digital signature signing process
recursive sum
biblio
Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Scalability
Cryptography
Software
Resiliency
pubcrawl
blockchain
software engineering
software development
digital signatures
Information systems
RSA
document handling
DSA
electronic digital signature
Consumer electronics
ECDSA
blockchain storage
blockchain storage of electronic signatures
central Web-server
cryptographic module
documented information exchanging
electronic digital signature generation
electronic document circulation
GOST RF Standard 34.10–2018
institution electronic document circulation
secure key storage
software tools
Web-interface
biblio
Developing Root Problem Aims to Create a Secure Digital Signature Scheme in Data Transfer
Submitted by aekwall on Mon, 02/08/2021 - 12:44pm
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
information technology
digital signature
electronic data interchange
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
data transfer
1
2
3
4
5
6
7
8
9
…
next ›
last »