Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Asymmetric Encryption
biblio
Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line
Submitted by aekwall on Mon, 01/25/2021 - 12:59pm
Servers
encryption
Protocols
Resiliency
Human behavior
pubcrawl
composability
Cryptography
Metrics
password
Public key
Elliptic curves
PLC
Ciphers
elliptic curve
Asymmetric Encryption
corporate network
High-speed
biblio
SRVB cryptosystem: another attempt to revive Knapsack-based public-key encryption schemes
Submitted by aekwall on Mon, 01/25/2021 - 12:59pm
encryption
Resiliency
Human behavior
pubcrawl
composability
Cryptography
Metrics
Lattices
public key cryptography
Communications technology
public-key cryptography
approximation theory
Asymmetric Encryption
algorithmic simplicity
consistent security improvements
Diophantine Approximation
Diophantine approximations based attacks
Knapsack Problem
knapsack problems
knapsack schemes
knapsack-based asymmetric encryption schemes
knapsack-based cryptography
knapsack-based encryption schemes
Knapsack-based public-key encryption schemes
Lattice Oracle
lattice problems oracle attacks
mathematical simplicity
Merkle-Hellman Cryptosystem
modern telecommunication technology
public-key cryptosystem
Shamir Cryptanalysis
SRVB cryptosystem
Subset Sum Problem
ubiquitous building block
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
Cloud Computing
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
data compression
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
symmetric cryptography
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
hashing functions
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
biblio
Secure Mobile Sensor Data Transfer using Asymmetric Cryptography Algorithms
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
Cloud Computing
encryption
Resiliency
Human behavior
pubcrawl
composability
Cryptography
Metrics
Databases
Elliptic curve cryptography
Ciphers
smart devices
Meters
Asymmetric Encryption
asymmetric algorithms
Mobile Sensor Data Security
secure data transfer
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
Servers
encryption
hybrid encryption
Receivers
data integrity
data encryption
Resiliency
Human behavior
pubcrawl
composability
Metrics
internet
Public key
public key cryptography
cyber threats
PKI
digital signatures
sensitive information
modified AES
online services
Asymmetric Encryption
asymmetric encryption technologies
confidential data transfer
confidential information leakage
confidential information trading
insecure network
key generation server
modified AES algorithm
secure transfer
symmetric encryption technologies
biblio
Design of a Cloud Storage Security Encryption Algorithm for Power Bidding System
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
AES
Asymmetric Encryption
asymmetric encryption algorithm
ciphertext file
Cloud Computing
cloud data storage
cloud storage
cloud storage environment
cloud storage files
cloud storage security encryption algorithm
composability
ECC
Electricity supply industry
file block
file encryption strength
file storage
file upload
Human behavior
hybrid encryption method
Metrics
plaintext upload file
power bidding system
power markets
power system security
pubcrawl
public key cryptography
Resiliency
storage management
symmetric encryption
symmetrical encryption algorithm
Tendering and bidding
biblio
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
exponentiation
Resiliency
Scalability
Asymmetric Encryption
composability
decryption process
embedded devices
encryption
energy consumption
Human behavior
Internet of Things
Internet of Things structure
Linux
Linux operating system
Metrics
microprocessor chips
microprocessor platform
Optimal Asymmetric Encryption Padding (OAEP)
pubcrawl
public key cryptography
Rabin-p
Rabin-p cryptosystem
Rabin-P encryption scheme
Raspberry Pi
Raspberry Pi setup
Raspbian
Raspbian OS
Rivest-Shamir-Adleman (RSA)
RSA-OAEP cryptosystem
RSA-OAEP encryption scheme
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
Cryptography
encryption
Receivers
Resiliency
Human behavior
pubcrawl
composability
Metrics
Databases
text analysis
Image color analysis
Public key
public key cryptography
Software algorithms
image colour analysis
sensitive data
asymmetric encryption algorithms
symmetric encryption algorithms
Asymmetric Encryption
Comparison
data encryption techniques
global network
keeping data
RGB color value
RGB Value
RSA and AES
survey
Text-to-Image Encryption
text-to-image encryption algorithms
biblio
A survey on Symmetric and Asymmetric Key based Image Encryption
Submitted by aekwall on Mon, 01/25/2021 - 12:56pm
Cryptography
encryption
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
Image coding
authenticity
Image Processing
decryption
Asymmetric Encryption
Asymmetric
asymmetric key
cipher text
different transfer mediums
encryption algorithms
encryption approaches
era security
image destruction
image encryption techniques
symmetric
technological advancements especially wireless sensor network
biblio
A Modified Tiny Asymmetric Encryption for Secure Ftp to Network
Submitted by aekwall on Mon, 01/25/2021 - 12:56pm
Servers
encryption
private key cryptography
Resiliency
Human behavior
pubcrawl
composability
Protocols
Metrics
client-server systems
Java
Elliptic curve cryptography
file transfer protocol
Asymmetric Encryption
modified tiny asymmetric encryption
secret key verification
secure FTP
server-client innovation
1
2
3
4
5
6
next ›
last »