Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
private key cryptography
biblio
A Modified Tiny Asymmetric Encryption for Secure Ftp to Network
Submitted by aekwall on Mon, 01/25/2021 - 11:56am
Servers
encryption
private key cryptography
Resiliency
Human behavior
pubcrawl
composability
Protocols
Metrics
client-server systems
Java
Elliptic curve cryptography
file transfer protocol
Asymmetric Encryption
modified tiny asymmetric encryption
secret key verification
secure FTP
server-client innovation
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
Internet of Things
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Cryptography
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
5G wireless networks
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
secrecy key size
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
A Comprehensive Security System for Digital Microfluidic Biochips
Submitted by grigby1 on Mon, 11/02/2020 - 12:36pm
authentication
authentication mechanism
bioassay completion time
biochips market
biology computing
bioMEMS
Cameras
CCD cameras
composability
comprehensive security system
Computer crime
defense mechanisms
Digital Microfluidic Biochips
Digital Microfluidics
DMFBs
Electrodes
Foundries
industrial property
intellectual property piracy
intellectual property security
invasive software
IP piracy
Lab-on-a-Chip
malicious attackers
Microfluidics
Pins
policy-based governance
private key cryptography
pubcrawl
resilience
Resiliency
secret keys
security
trojan
Trojan attacks
Trojan horses
biblio
Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
I-O Systems
i-o systems security
security
authentication
battery power
chip fabrication process
chip-unique key
computer network security
copy protection
crossover RO PUF
Cryptographic Protocols
Cryptography
delays
device authentication
industry Internet of Things
Internet of Things
interstage crossing structure
Inverters
IoT security
key generation
Key-sharing
learning (artificial intelligence)
lightweight key sharing protocols
lightweight security primitive
lookup table
LUT
machine learning
machine learning (ML)
one-to-one input-output mapping
Physical Unclonable Function
physical unclonable function (PUF)
physical unclonable function-based key sharing
private key cryptography
Protocols
pubcrawl
PUF-based key sharing method
resource-constrained devices
Ring Oscillator
Scalability
security protocols
shared key
silicon physical unclonable function
Table lookup
biblio
Generic Approach to Outsource the Decryption of Attribute-Based Encryption in Cloud Computing
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
encryption
authorisation
Cloud Computing
outsourcing
Adaptation models
standards
private key cryptography
public key cryptography
pubcrawl
composability
Metrics
Resiliency
resilience
security model
attribute-based encryption
generic construction
ABE ciphertext
ABE outsourcing schemes
adaptive security
black-box way
concrete constructions
efficient transformation key generation algorithm
faster decryption time
generic approach
modified decryption outsourcing mode
OD-ABE scheme
outsourced decryption
public transformation key
selective security model
shorter bit length
underlying ABE scheme
underlying standard ABE
black box encryption
biblio
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
encryption
authorisation
data privacy
computational complexity
private key cryptography
pubcrawl
composability
Metrics
Resiliency
resilience
Decoding
attribute-based encryption
Identity-based encryption
A-IBE scheme
Accountable authority
authority identity-based encryption
black-box security
ciphertexts
decoder box
dummy identity-based encryption
full black-box security
generic construction
malicious private key generator
token-based identity-based encryption
underlying TB-IBE scheme
user decryption
user identity
user privacy security
user private key
black box encryption
biblio
A Novel Logical Locking Technique Against Key-Guessing Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
invasive software
Hardware
private key cryptography
Hamming distance
pubcrawl
collaboration
Computer crime
Human Factors
policy-based governance
integrated circuits
added logics
Brute Force Attack
embedded computing
hardware attacks
hill climbing attack
illegal integrated circuit overproduction
industrial property
intellectual property
intellectual property piracy
ISCAS'85 benchmark circuits
key guessing attacks
Key-gates
key-guessing attacks
logical locking
logical locking technique
logically locked design
Observability
path sensitization attacks
Secret key
secured hardware
secured locking mechanism
system analysis and design
Testability measures
Trojan insertion
brute force attacks
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 11:41am
private key cryptography
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
power consumption
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
combinational cells
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
Dynamic Differential Logic
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
biblio
Policy-based Revolutionary Ciphertext-policy Attributes-based Encryption
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
Cloud Computing
Scalability
Servers
encryption
attribute-based encryption
private key cryptography
Human behavior
pubcrawl
policy-based governance
hospitals
trusted authority
Systems architecture
TA
CP-ABE scheme
Ciphertext-policy Attributes-based Encryption (CP-ABE)
cryptographic mechanism
flexible updating policy control
personal health record testing
Personal Health Records (PHRs)
PHR testing
policy identity number
policy revocation
policy-based revolutionary ciphertext-policy attribute-based encryption scheme
revocation
Trusted authority (TA)
1
2
3
4
5
6
7
next ›
last »