Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
asymmetric cryptography
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
Cloud Computing
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
data compression
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
symmetric cryptography
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
hashing functions
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
encryption
Internet of Things
Trusted Computing
Resiliency
Human behavior
pubcrawl
Metrics
message authentication
public key cryptography
Heuristic algorithms
Elliptic curve cryptography
Elliptic curves
ECC
security requirements
encoding
authenticated encryption
Compositionality
Internet of Things devices
signature
Asymmetric Encryption
asymmetric cryptography
encoding scheme
SE-Enc
trusted scheme
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
encryption
Computational efficiency
decryption
Resiliency
Human behavior
pubcrawl
privacy
Metrics
Public key
public key cryptography
Security analysis
Compositionality
symmetric cryptography
network resources
Asymmetric Encryption
communication overhead
asymmetric cryptography
Cathode ray tubes
Chinese remainder theorem
chosen plaintext attack
dynamic networks
group membership changes
high computational cost
lightweight AMOUN
lightweight scalable multirecipient asymmetric cryptographic scheme
Multi-recipient Encryption
multiple recipients
MultiRSA
securing multiparty communication
biblio
A Tamper-Resistant Digital Token-Based Rights Management System
Submitted by grigby1 on Tue, 02/06/2018 - 12:54pm
Access Control
API
APIs
asymmetric cryptography
authentication
authorisation
computer architecture
Cryptography
Digital rights management
digital token
eTRON architecture
groupware
Hardware
hardware-software collaboration
Human behavior
Human Factors
internet
message authentication
Metrics
Peer-to-peer computing
peer-to-peer manner
Protocols
pubcrawl
public key cryptography
Resiliency
rights management system
Scalability
Symmetric Key Cryptography
Tamper-Resistance
tamper-resistant digital token
tamper-resistant digital tokens
token owner
Ubiquitous Computing Security
biblio
Scalable and privacy-preserving authentication protocol for secure vehicular communications
Submitted by grigby1 on Fri, 11/03/2017 - 10:31am
asymmetric cryptography
authentication
Cryptographic Protocols
Cryptography
efficient
ESPA protocol
message authentication
PKI
PKI-based authentication protocols
privacy
privacy-preserving authentication protocol
Protocols
pubcrawl
public key cryptography
public-key infrastructure
Safety
Scalability
scalable and privacy-preserving authentication protocol
Scalable Security
security
symmetric cryptography
symmetric hash message authentication code
V2I
V2V
VANET
VANETs
vehicle to infrastructure communications
vehicle to vehicle communications
vehicular ad hoc networks
vehicular communications security