Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
Oblivious Signature based on Blind Signature and Zero-Knowledge Set Membership
Submitted by grigby1 on Tue, 04/26/2022 - 1:49pm
blind signature
Communication Systems
digital signatures
oblivious signature
pubcrawl
Receivers
resilience
Resiliency
Scalability
signal processing
zero-knowledge set membership
biblio
Eliminating Broadband Covert Channels in DSA-Like Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 2:13pm
data hiding
subliminal channel
Steganography
Scalability
Resiliency
resilience
Redundancy
Public key
pubcrawl
DSA
digital signatures
data communication
covert channels
covert channel
control systems
Compositionality
composability
channel capacity
Broadband communication
biblio
BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures
Submitted by aekwall on Fri, 02/25/2022 - 9:44am
privacy
Protocols
pubcrawl
Resiliency
standards
Compositionality
digital signatures
Predictive Metrics
NIST
provable security
Digital-signature-scheme
DSKS-attack
exclusive-ownership
message-bound-signatures
NIST-PQC-candidates
non-re-signability
biblio
Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds
Submitted by aekwall on Fri, 02/04/2022 - 9:31am
certificate
cloud server
Companies
composability
Costs
digital signatures
encryption
Human behavior
information processing
Media
Metrics
pubcrawl
Repudiation
Resiliency
signature
Signcryption
biblio
SM9 Digital Signature with Non-Repudiation
Submitted by grigby1 on Thu, 09/16/2021 - 10:10am
Metrics
SM9
Servers
Resiliency
resilience
Repudiation
pubcrawl
private key generation
non-repudiation
composability
Identity-based encryption
identity based cryptography
Human behavior
Homomorphic encryption
encryption
digital signatures
digital signature
computational intelligence
biblio
Cryptography with information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 3:39pm
quantum computing
unconditionally secure schemes
trusted initializer model
power system security
long-term security
information theoretic security
Computer graphics
cryptosystems
digital signatures
information security
Scalability
information theory
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptography
biblio
Simplified Method for Fast and Efficient Incident Detection in Industrial Networks
Submitted by grigby1 on Tue, 03/30/2021 - 10:51am
industrial network
testing
telecommunication traffic
standards
simplified method
security incident detection
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
network traffic
Modbus protocol
machine learning
intrusion detection system
Anomaly Detection
industrial Modbus protocol
IDS system Zeek
IDS
identified signature recognition
identified anomaly recognition
ICS Anomaly Detection
ICs
fast incident detection
efficient incident detection
DoS Attack Detection
DNP3 protocol
distributed network protocol 3
digital signatures
computer network security
biblio
User behavior Pattern -Signature based Intrusion Detection
Submitted by grigby1 on Mon, 03/29/2021 - 12:28pm
Intrusion Detection using Statistics
user suspicious behavior
user behavior Pattern -signature
user authentication
Statistical Based Intrusion Detection
security
Scalability
SBID model
Resiliency
resilience
pubcrawl
PIDE model
pattern recognized engine
Pattern Based Intrusion Detection
particular procedure
main concerned area
authentic user
intrusion detection system
Intrusion Detection
Human behavior
host-based IDS monitors user behavior
extensive system
expert systems
expert system
Engines
digital signatures
computer system
computer network security
Computer hacking
Computational modeling
biometrics (access control)
biometric applications
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
Establishing Authenticity for DICOM images using ECC algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
medical image processing
telemedicine
tampered data
signature verification
security
Scalability
Resiliency
resilience
pubcrawl
privacy
patient records
MRI brain images
Metrics
Medical services
medical related image files
medical information systems
authenticity
medical image files
Medical diagnostic imaging
magnetic resonance imaging
image watermarking
Human behavior
Electronic Medical Records (EMR)
ECDSA algorithm
ECDSA
ECC algorithm
digital signatures
DICOM images
DICOM
data privacy
BIOS
biomedical MRI
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »