Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
digital signature
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by
grigby1
on Tue, 10/15/2019 - 1:44pm
attack scenarios
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
internet
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
quality of service
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
VoIP
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
biblio
Document Certificate Authentication System Using Digitally Signed QR Code Tag
Submitted by
aekwall
on Mon, 09/23/2019 - 9:46am
Cryptography
Resiliency
pubcrawl
authentication
cyber physical systems
Degree certificate
digital signature
encryption key
QR code
QR codes
biblio
Secure Protocol for Identity-based Provable Data Possession in Cloud Storage
Submitted by
aekwall
on Mon, 09/23/2019 - 9:26am
digital signature
Cryptography
Resiliency
pubcrawl
Cloud Security
Predictive Metrics
remote data audit
provable security
Compositionality
biblio
CRYSTALS - Kyber: A CCA-Secure Module-Lattice-Based KEM
Submitted by
aekwall
on Mon, 03/18/2019 - 8:53am
digital signature
encryption
Cryptographic Protocols
Protocols
Electronic mail
Resiliency
pubcrawl
composability
Metrics
authenticated-key-exchange schemes
CCA-secure KEM
CCA-secure module-lattice-based KEM
ciphertext sizes
CPA-secure public-key encryption scheme
CRYSTALS - Kyber
key encapsulation
key sizes
key-encapsulation mechanism
key-establishment protocols
Lattices
Learning with errors
module lattices
post quantum cryptography
post-quantum cryptographic primitives
post-quantum cryptographic schemes
postquantum security
Public key
public key cryptography
quantum computing
quantum cryptography
quantum random oracle models
black box encryption
biblio
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors
Submitted by
aekwall
on Wed, 02/13/2019 - 10:57am
Scalability
digital signature
gaussian sampling
lattice-based cryptography
ring-lwe
trapdoor
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
biblio
Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm
Submitted by
grigby1
on Fri, 02/08/2019 - 3:21pm
and Adleman algorithm
pubcrawl
Asymmetric Encryption
asymmetric keys
authentication
combination method
Communication networks
composability
Compositionality
Data Security
decryption process
digital signature
digital signature algorithm
Digital Signature Standard
digital signatures
DSA
DSA 512
DSA algorithms
DSS
encryption
encryption process
Human behavior
information
information and communication systems
Metrics
Public key
public key cryptography
public key cryptography system
resilience
Resiliency
Rivest
RSA
RSA 1024
RSA algorithm
RSA encryption
security
security system analysis
Shamir
biblio
Design of heterogeneous integrated digital signature system for ensuring platform independence
Submitted by
grigby1
on Fri, 09/28/2018 - 2:12pm
browser environment
Browsers
Companies
contracts
digital signature
digital signatures
digital transactions
heterogeneous integrated digital signature system
HTML5
Insurance
per-user contract management features
platform
platform independence
pubcrawl
resilience
Scalability
Software
software extension
software maintenance
User Terms
WAS
biblio
On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings
Submitted by
grigby1
on Thu, 05/24/2018 - 11:19am
certificateless
composability
Compositionality
cryptanalysis
digital signature
digital signatures
Metrics
provable security
pubcrawl
resilience
Resiliency
signer ambiguity
strong designated verifier
biblio
Digital signature using MAC address based AES-128 and SHA-2 256-bit
Submitted by
grigby1
on Wed, 05/16/2018 - 12:48pm
advanced encryption standard
AES-128
composability
computer science
Cryptography
digital messaging
digital signature
digital signatures
encryption
Human behavior
human factor
MAC address
Metrics
pubcrawl
Repudiation
resilience
Resiliency
secure hash algorithm
Seminars
SHA-2 256 bit
standards
telecommunication security
word length 256 bit
biblio
Advanced biometric home security system using digital signature and DNA cryptography
Submitted by
grigby1
on Tue, 01/23/2018 - 1:53pm
advanced biometric home security system
advanced security system
authentication
authorisation
biometrics (access control)
Conferences
Cryptography
digital signature
digital signatures
DNA
DNA cryptography
Geo-Detection
home automation
Human behavior
integrated digital signature
Medical services
Metrics
multifeature biometric traits
privacy
pubcrawl
Resiliency
Smart card
smart cards
Technological innovation
1
2
3
next ›
last »