Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resilience
biblio
5Gen-C: Multi-Input Functional Encryption and Program Obfuscation for Arithmetic Circuits
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
composability
Metrics
multi-input functional encryption
multilinear maps
program obfuscation
pubcrawl
resilience
Resiliency
White Box Encryption
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
Enhanced Operating System Protection to Support Digital Forensic Investigations
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
operating systems (computers)
forensic-friendly OS design
Forensics
fully homomorphic encryption
Metrics
obfuscation
operating system extensions
operating system protection
operating systems
Forensic software
OS tamper-resistance
pubcrawl
resilience
Resiliency
security
system data recovery
White Box Encryption
white-box cryptography
Cryptography
CEF
Ciphers
component encryption
composability
computer systems
computing on encrypted data
computing with encrypted functions
criminal activity footprints
CED
data integrity
data provenance
data veracity
digital forensic investigations
Digital Forensics
encryption
evidence collection
biblio
Vehicle Network Security Testing
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
testing
Patterns
Payloads
Protocols
pubcrawl
resilience
Resiliency
security
security loophole
pattern decoding
V2V
V2V V2X loopholes
V2X
vehicle
vehicle network security testing
vehicular ad hoc networks
white box approach
White Box Encryption
gateway module security testing
black box approach
CAN
Communication networks
composability
computer network security
diagnostics security
ECU
Ethernet
authentication
gateway security
grey box approach
in-vehicle network security implementation
in-vehicle networks
internetworking
message authentication
Metrics
Network
biblio
Cliptography: Post-Snowden Cryptography
Submitted by grigby1 on Mon, 03/05/2018 - 1:05pm
backdoor resistance
black box encryption
cliptography
composability
Cryptography
implementation subversion
kleptography
Metrics
pubcrawl
resilience
Resiliency
Steganography
biblio
Spinner: Semi-Automatic Detection of Pinning Without Hostname Verification
Submitted by grigby1 on Mon, 03/05/2018 - 1:05pm
black box encryption
composability
Metrics
pubcrawl
resilience
Resiliency
biblio
Generic Semantic Security Against a Kleptographic Adversary
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
random key generation
black box encryption
composability
kleptography
Metrics
pke
pubcrawl
resilience
Resiliency
semantic security
biblio
Time-Based One-Time Password for Wi-Fi Authentication and Security
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
pubcrawl
wireless networks
wireless LAN
Wireless fidelity
WiFi Security
Wi-Fi network security
Time-based One-Time Password (TOTP)
time-based one-time password
SSID
Service Set Identifier (SSID)
security infrastructure
Resiliency
resilience
authentication
Protocols
periodic secure passwords
Metrics
Internet of Things (IoT)
internet
encryption
Dictionaries
computer network security
composability
completely automated Wi-Fi authentication system
black box encryption
authorisation
biblio
A Practical Quantum Public-Key Encryption Model
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
public key cryptography
secret keys
Resiliency
resilience
quantum trapdoor one-way function
quantum public-key encryption model
quantum public key encryption model
Quantum mechanics
quantum information security
quantum cryptography
quantum computing
black box encryption
Public key
pubcrawl
Metrics
encryption
decryption process
Computational modeling
computational indistinguishability
composability
blackbox client-side
biblio
Garbled Protocols and Two-Round MPC from Bilinear Maps
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
noninteractive zero-knowledge proof system
Yao's garbled circuits construction
witness encryption
universal composability
two-round UC secure protocol
two-round MPC
standards
Resiliency
resilience
Random access memory
random access machines
RAM programs
pubcrawl
Protocols
bilinear maps
multiparty secure computation protocols
Metrics
garbling arbitrary protocols
garbled protocol construction
encryption
encoding
distributed protocol
Cryptographic Protocols
Computational modeling
composability
Circuit Garbling
black box encryption
« first
‹ previous
…
659
660
661
662
663
664
665
666
667
…
next ›
last »