Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
digital signature
biblio
An Efficient Non-Profiled Side-Channel Attack on the CRYSTALS-Dilithium Post-Quantum Signature
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
pubcrawl
Hardware Security
quantum computing
Quantum mechanics
composability
side-channel attacks
Compositionality
Resistance
Power measurement
digital signature
Transforms
standardization
correlation power analysis
number theoretic transform
Post-quantum cryptography
theoretical cryptography
biblio
Secure Digital Signature Validated by Ambient User amp;\#x2019;s Wi-Fi-enabled devices
Submitted by grigby1 on Tue, 04/26/2022 - 2:50pm
public-key
Wi-Fi
validation
Servers
Seals
Scalability
RSSI
Resiliency
resilience
Receivers
digital signature
Public key
pubcrawl
private-key
Mobile handsets
information technology
email spoofing
Electronic mail
digital signatures
biblio
Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature Algorithm
Submitted by grigby1 on Wed, 03/23/2022 - 12:34pm
Internet-of-Things
smart meters
smart meter
Smart Grids
Smart Grid Sensors
smart contracts
Resiliency
resilience
real-time systems
pubcrawl
machine learning
blockchains
Human Factors
Human behavior
Fog computing
Elliptic curve cryptography
digital signature
cyber-physical system
Cryptography
Computational modeling
composability
Cloud Computing
biblio
The Scalable Group Testing of Invalid Signatures based on Latin Square in Wireless Sensors Networks
Submitted by grigby1 on Tue, 03/15/2022 - 12:13pm
Metrics
scalable verification
wireless sensors networks
Latin square
identification of invalid signature
Batch verification
parallel processing
Signal processing algorithms
Compositionality
encryption
Wireless communication
wireless sensor networks
digital signature
Scalability
Resiliency
resilience
pubcrawl
signal processing
biblio
Digital Signature Scheme over Lattices
Submitted by aekwall on Fri, 02/04/2022 - 10:32am
Receivers
Repudiation
Signing
digital signature
Computers
verification
key generation
Lattices
Forgery
Cryptography
composability
Human behavior
Resiliency
Metrics
pubcrawl
information technology
information security
biblio
Securing the Integrity of PDF Files using RSA Digital Signature and SHA-3 Hash Function
Submitted by aekwall on Fri, 02/04/2022 - 10:30am
verification
Repudiation
Signing
SHA-3
RSA algorithm
Portable document format
non repudiation
Keccak
file integrity
digital signature
data science
Databases
Distance measurement
public key cryptography
Hash functions
Receivers
composability
Human behavior
Resiliency
Metrics
pubcrawl
authentication
biblio
SM9 Digital Signature with Non-Repudiation
Submitted by grigby1 on Thu, 09/16/2021 - 11:10am
Metrics
SM9
Servers
Resiliency
resilience
Repudiation
pubcrawl
private key generation
non-repudiation
composability
Identity-based encryption
identity based cryptography
Human behavior
Homomorphic encryption
encryption
digital signatures
digital signature
computational intelligence
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
decryption time
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
MQTT protocol
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
computer network security
queueing theory
security mechanism
Payloads
digital signatures
pubcrawl
Resiliency
transport protocols
Protocols
Cryptographic Protocols
security
Memory management
Internet of Things
encryption
digital signature
Scalability
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
man-in-the-middle attack
Signing
sender identity
security
Scalability
Resiliency
public key cryptography
Public key
pubcrawl
private key cryptography
message integrity
message authentication
authentication
integrity
encryption
digital world
digital signatures
digital signature
digital era
cyber-attacks
Cryptography
cryptographic key pairs
confidentiality
Conferences
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
1
2
3
4
5
6
next ›
last »