Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
symmetric cryptography
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
Cloud Computing
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
data compression
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
symmetric cryptography
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
hashing functions
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
encryption
Computational efficiency
decryption
Resiliency
Human behavior
pubcrawl
privacy
Metrics
Public key
public key cryptography
Security analysis
Compositionality
symmetric cryptography
network resources
Asymmetric Encryption
communication overhead
asymmetric cryptography
Cathode ray tubes
Chinese remainder theorem
chosen plaintext attack
dynamic networks
group membership changes
high computational cost
lightweight AMOUN
lightweight scalable multirecipient asymmetric cryptographic scheme
Multi-recipient Encryption
multiple recipients
MultiRSA
securing multiparty communication
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
security
Cryptography
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
privacy
vehicular ad hoc networks
Metrics
authentication
attacks
public key cryptography
VANET
computational overhead
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
pseudonyms
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
biblio
Enhanced Lightweight Cloud-assisted Mutual Authentication Scheme for Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
security
IoT
Cloud Computing
Scalability
Servers
data privacy
telecommunication security
Cryptographic Protocols
Protocols
mobile computing
Resiliency
Human behavior
pubcrawl
privacy
tools
authentication
message authentication
public key cryptography
IoT security
Wireless fidelity
Authentication Protocols
cloud-assisted authentication scheme
IoT authentication
lightweight cloud-assisted mutual authentication scheme
secure authentication process
symmetric cryptography
wearable computers
Wearable devices
wearables security
biblio
Quantum Grover Attack on the Simplified-AES
Submitted by aekwall on Mon, 03/18/2019 - 8:53am
quantum computing security
black box encryption
Block Cipher
composability
Grover attack
Metrics
pubcrawl
Quantum cryptanalysis
Quantum simulation
Resiliency
symmetric cryptography
biblio
Comparing the Usability of Cryptographic APIs
Submitted by K_Hooper on Wed, 05/09/2018 - 10:00am
API usability
application program interfaces
auxiliary features
code security
controlled experiment
cryptographic API usability
cryptographic application programming interfaces
cryptographic library
Cryptography
cryptography errors
documentation
documentation accessibility
GitHub
Guidelines
Libraries
programming
pubcrawl
Python developers
Resiliency
Scalability
Security by Default
software libraries
symmetric cryptography
usability
Usable Security
biblio
Scalable and privacy-preserving authentication protocol for secure vehicular communications
Submitted by grigby1 on Fri, 11/03/2017 - 10:31am
asymmetric cryptography
authentication
Cryptographic Protocols
Cryptography
efficient
ESPA protocol
message authentication
PKI
PKI-based authentication protocols
privacy
privacy-preserving authentication protocol
Protocols
pubcrawl
public key cryptography
public-key infrastructure
Safety
Scalability
scalable and privacy-preserving authentication protocol
Scalable Security
security
symmetric cryptography
symmetric hash message authentication code
V2I
V2V
VANET
VANETs
vehicle to infrastructure communications
vehicle to vehicle communications
vehicular ad hoc networks
vehicular communications security
biblio
Symmetric Cryptography Using Multiple Access Circular Queues (MACQ)
Submitted by grigby1 on Mon, 03/27/2017 - 9:52am
black box
black box encryption
Block Ciphering Algorithm
composability
Cryptography
decryption
encryption
Feistel cipher
Metrics
pubcrawl
Random NumberGenerators (RNGs)
Resiliency
S-box
symmetric cryptography
biblio
Delegated Authenticated Authorization for Constrained Environments
Submitted by BrandonB on Mon, 05/04/2015 - 1:54pm
authentication
authorization
client authentication
constrained environments
cross-domain setting
Cryptographic Protocols
delegated authenticated authorization
Face
Internet of Things
Peer-to-peer computing
performance evaluation
protocol
Protocols
resource-constrained node
smart objects
symmetric cryptography
trusted host