Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
private key
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
Mobile Ad Hoc Network for Security Enhancement
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
pubcrawl
Ad Hoc Network Security
ad hoc on-demand distance vector routing protocol
advanced encryption standard
AODV
Compositionality
Cryptography
decryption processes
encryption
game theoretical approach
game theory
hackers node
identification process
MANET
Message Digest 5
Metrics
mobile ad hoc network
mobile ad hoc networks
private key
proactive method
Public key
reactive method
Resiliency
Routing protocols
Secure Hashing Algorithm
security enhancement
telecommunication security
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 10:18am
asymmetric encryption key
asymmetric Rivest-Shamir-Adleman encryption method
Correlation
encryption
free-space optical communication
home computing
intrusion
key length
mean square error methods
Metrics
optimal key length
performance enhancement
private key
pubcrawl
Public key
public key cryptography
Receivers
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
smart home service
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
biblio
Malsign: Threat Analysis of Signed and Implicitly Trusted Malicious Code
Submitted by grigby1 on Wed, 05/30/2018 - 2:55pm
benign software
Browsers
code signing
code signing infrastructure
Companies
Computer crime
digital signatures
genuine software
Human behavior
Human Factors
implicitly trusted malicious code
invasive software
malicious code signing
Malsign
malware
Metrics
PKCS
PKI
PKI Trust Models
private key
private key cryptography
pubcrawl
Resiliency
Scalability
Servers
signed code
signed malware
signing keys
targeted attacks
threat analysis
Trusted Computing
trusted software providers
biblio
Have the security flaws surrounding BITCOIN effected the currency's value?
Submitted by grigby1 on Thu, 02/15/2018 - 10:41am
bitcoin
Bitcoin protocol
bitcoin security
Bitcoin services
blockchain
Companies
complex public address
Crypto Currency Digital Security
currency value
data analysis
decentralized virtual currency
digital currency
digital security environment
electronic money
financial data processing
Fluctuations
Human behavior
human factor
Human Factors
market value
Online banking
peer to peer transactions
Peer-to-peer computing
private key
Protocols
pubcrawl
Scalability
security breech
security flaws
security of data
statistical analysis
statistical data analysis
transaction processing
volatile currency
biblio
A bisectional multivariate quadratic equation system for RFID anti-counterfeiting
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
Algorithm design and analysis
anticounterfeit scheme
bisectional multivariate quadratic equation system
BMQ polynomials
BMQE system
counterfeit
Databases
encryption
encryption process
EPC code
Ergodic Matrix
finite field
Galois fields
Human behavior
Human Factors
key generation process
matrix algebra
matrix sets
private key
private key cryptography
pubcrawl
Public key
public key cryptography
Quadratic
quantum cryptography
Radio frequency
radiofrequency identification
Resiliency
RF tag data encryption
RFID
RFID anticounterfeiting
RFIDs
set theory
biblio
"HRJ_encryption: An ASCII code based encryption algorithm and its implementation"
Submitted by grigby1 on Tue, 02/14/2017 - 11:10am
Algorithm design and analysis
arrays
ASCII Code
ASCII code based encryption algorithm
cipher text
Cloud Computing
decryption
encryption
HRJ_encryption
information technology
personal desktop
Plain Text
private key
private key cryptography
pubcrawl170102
Public key
public key cryptography
Receivers
Secret key
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
anonymity
anonymization
Asymmetric Encryption
asymmetric encryption scheme
asymmetric secure multiparty computation protocol
confidentiality
Cryptographic Protocols
data privacy
decryption key
encryption
financial analysis
individual privacy
Joints
medical science
message encryption
packetization
privacy
privacy preservation
private key
private key cryptography
protocol design
Protocols
Public key
public key cryptography
public-key encryption
Secure Multi-Party Computation (SMC)
security
trusted third party
trusted third party (TTP)
TTP