Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
digital signature
biblio
Overhead Analysis of the Use of Digital Signature in MQTT Protocol for Constrained Device in the Internet of Things System
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
computer network security
Scalability
digital signature
encryption
Internet of Things
Memory management
security
Cryptographic Protocols
Protocols
transport protocols
Resiliency
pubcrawl
digital signatures
Payloads
security mechanism
queueing theory
MQTT protocol
Message Queue Telemetry Transport protocol
digital signature mechanism
memory usage
class-2 device
class-l device
constrained device
constrained-device
constrained-devices
decryption time
flash usage
Internet of Things system
message delivery time
Message Queue Telemetry Transport
overhead analysis
signature verification performance
transmission process
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
authentication
Conferences
confidentiality
cryptographic key pairs
Cryptography
cyber-attacks
digital era
digital signature
digital signatures
digital world
encryption
integrity
man-in-the-middle attack
message authentication
message integrity
private key cryptography
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
security
sender identity
Signing
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
Scalability
digital signature
Cryptography
decryption
private key cryptography
Receivers
information security
network security
Resiliency
pubcrawl
Image coding
Image color analysis
message authentication
digital signatures
encryption
Public key
public key cryptography
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
cover image
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
biblio
Detection of Blind Signature Using Recursive Sum
Submitted by aekwall on Mon, 02/08/2021 - 1:45pm
Scalability
encryption
private key cryptography
Resiliency
pubcrawl
digital signatures
public key cryptography
Elliptic curve cryptography
public key encryption
RSA
digital signature
blind signature
blind signature detection
blind source separation
blinded version
data origin authentication
digital messages
digital signature security
digital signature signing process
recursive sum
biblio
Developing Root Problem Aims to Create a Secure Digital Signature Scheme in Data Transfer
Submitted by aekwall on Mon, 02/08/2021 - 1:44pm
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
information technology
digital signature
electronic data interchange
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
data transfer
biblio
Potential Barriers to Music Fingerprinting Algorithms in the Presence of Background Noise
Submitted by grigby1 on Wed, 01/20/2021 - 4:07pm
acoustic feature modeling
Acoustic Fingerprint
Acoustic Fingerprints
Acoustic signal processing
audio sample identification
audio signal
audio signal processing
classification
composability
condensed signature
deep learning techniques
digital signature
digital signatures
Hashing curve detection
Human behavior
iKala dataset
Image Processing
learning (artificial intelligence)
MFP
MIR-1K dataset
music
music fingerprint classification
music fingerprinting algorithms
MusicBrainz dataset
pubcrawl
resilience
Resiliency
Shazam
signal classification
song identification
biblio
Using Format Migration and Preservation Metadata to Support Digital Preservation of Scientific Data
Submitted by grigby1 on Fri, 12/11/2020 - 2:59pm
Chemicals
Compositionality
data authenticity
data fixity
data integrity
data intensive scientific discovery
digital preservation
digital signature
digital signatures
e-science
format migration
format verification
Grammar
mapping rules
meta data
metadata
Metadata Discovery Problem
object transformation
PREMIS
preservation metadata
pubcrawl
resilience
Resiliency
Scalability
scientific information systems
Software
Software Architecture
system architecture
Systems architecture
valuable scientific data
biblio
Robust Digital Signature to Protect IP Core against Fraudulent Ownership and Cloning
Submitted by grigby1 on Mon, 11/02/2020 - 12:30pm
composability
consumer electronic devices
crypto digital signature approach
Cryptography
digital signal processing chips
digital signature
digital signature processing cores
digital signatures
DSP
encoding
encryption
fraudulent ownership
industrial property
intellectual property security
IP cloning
IP core
multimedia based reusable Intellectual property cores
multiple security modules
policy-based governance
Protection.
pubcrawl
resilience
Resiliency
robust digital signature
synthesis
system-on-chip
system-on-chips
watermarking approach
biblio
Enhancing Security in Medical Image Informatics with Various Attacks
Submitted by aekwall on Mon, 10/19/2020 - 12:00pm
Arnold’s Cat Map
authorisation
authorized medical experts
Aycan sample digital images
Cryptography
digital signature
digital signatures
digital watermarking
diseases
electronic patient record
EPR
extraction process
Human behavior
image archives
Image coding
image watermarking
internet
Kerberos
medical data
Medical Expert biometric information
Medical Expert Communication
medical image authentication
Medical image compression
Medical image informatics
medical image processing
medical information systems
Metrics
National Institute of Health
NIH
pubcrawl
Region of Interest and Non-Interest
Resiliency
reversible watermarking
surgery
telemedicine
biblio
A Digital Signature System Based on Real Time Face Recognition
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
pubcrawl
Metrics
Resiliency
Scalability
resilience
face recognition
biometric encryption
digital signature
LBPH
RSA
SHA256
1
2
3
4
5
next ›
last »