Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
digital signatures
biblio
United We Stand: A Threshold Signature Scheme for Identifying Outliers in PLCs
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
Pulse width modulation
malware
Metrics
OpenPLC software
particular state
Pins
PLCs
predefined states
programmable controllers
Protocols
Prototypes
pubcrawl
malicious disruption
pulse width modulation pins
PWM
Raspberry Pi
Registers
resilience
Resiliency
Scalability
security
signature shares
uncorrupted PLC
group-signature
\$-threshold signature scheme
Anomaly Detection
BIOS Security
compromised state
control engineering computing
corrupted PLC
cyber security awareness week-2017 competition
digital signatures
electro-mechanical processes
finite state machine
finite state machines
(k
Human Factors
I-O Systems
i-o systems security
I/O pin configuration attack
input-output mechanism
IO pin configuration attack
l)-threshold signature scheme
Legacy PLC system
legacy PLCs
malicious code
biblio
Generating Digital Signature using Facial Landmlark Detection
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
digital signature generation
biometric encryption
Facial features
Audio recognition
biometric identification
CDNU Algorithm
compressed textual signature
database storage overhead
Digital Security
data compression
facial landmark detection
facial landmarks
facial recognition
Huffman coding
real-time optimized encryption procedure
secure digital signature
security advisors
user account information database
information security
encryption
feature extraction
pubcrawl
Metrics
Resiliency
optimization
Scalability
Databases
Cryptography
resilience
social networking (online)
face recognition
digital signatures
image texture
confidential information
Image coding
biblio
Blind Certificate Authorities
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
SMTP servers
public key cryptography
public key registration
resilience
Resiliency
Scalability
SCI protocol
secure channel injection protocols
Secure-Multiparty-Computation
pubcrawl
standard email server implementations
TLS
truly anonymous systems
X.509 Certificate
zero-knowledge certificate
zero-knowledge certificate signing protocol
Zero-knowledge-Proof
Cryptographic Protocols
alice@domain.com
anonymity
anonymous messaging
anonymous proofs
authorisation
authorization
blind certificate authority
certificate binding
account ownership
data privacy
digital signatures
Electronic mail
Gmail
MPC
party encrypted communications
privacy
biblio
Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
asymmetric case
type-3 pairing
TEPLA library
Ostrovsky-Sahai-Waters
original ABKEM
one-way-CCA security
concurrent man-in-the-middle security
challenge-and-response protocol
challenge and response
BN curve
attribute-based key-encapsulation mechanisum
attribute based
asymmetric pairing
Cryptographic Protocols
asymmetric bilinear map
ABAuth
Asymmetric Encryption
Computational efficiency
Compositionality
authentication
digital signatures
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
biblio
Identity-Based Aggregate Signature Scheme in Vehicle Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
message authentication
vehicular ad hoc networks
vehicle network
vehicle identity
vehicle anonymity
vehicle ad-hoc network
VANET
telecommunication security
Resiliency
privacy preserving
privacy
Metrics
message signatures
pubcrawl
identity-based aggregate signature scheme
digital signatures
data privacy
Cryptography
Compositionality
Cloud Computing
authorisation
authentication
Aggregates
aggregate signature algorithm
Aggregate Signature
Ad Hoc Network Security
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning
Submitted by grigby1 on Fri, 07/10/2020 - 1:08pm
supervised classifiers
Metrics
neural nets
private clouds
program diagnostics
pubcrawl
ransomware samples
resilience
Resiliency
static analysis
malware
transfer learning
Trusted Computing
trusted malware signature generation method
TrustSign signature generation process
unsupervised classifier
Unsupervised Learning
VGG-19 neural network model
virtualisation
volatile memory
distribution time
Cloud Computing
cloud virtualization technology
convolutional neural networks
Cryptography
cryptojacking
cryptojacking attacks
deep feature transfer learning
deep learning
digital signatures
Automatic Signature Generation
dynamic analysis
fileless malware
high-level deep features
Human behavior
Human Factors
ImageNet dataset
in-browser cryptojacking attacks
inspection procedure
invasive software
biblio
Elliptic curve and Lattice cryptosystem
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
lattice
Vectors
square matrices
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
Metrics
matrix algebra
Lattices
lattice-based cryptography
lattice cryptosystem
closest vector problem
Homomorphic encryption
finite local ring
encryption
Elliptic curves
Elliptic curve over a ring
Elliptic curve cryptography
elliptic curve
discrete logarithm
digital signatures
Diffie-Hellman
cryptography method
conjugate problem
biblio
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
IoT security
Xilinx platform studio tool
Virtex-5 xc5vfx70t device based platform
Software
secure data transaction
Scalability
RNS implementation
Resiliency
resilience
residue number systems
residue number system (RNS)
residue number system
public key cryptography
pubcrawl
Metrics
IoT Security.
C language
Internet of Things
hardware-software codesign implementation
hardware-software codesign
Hardware software codesign
Hardware
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC cipher
digital signatures
digital signature
compute-intensive components
Communication Systems
Ciphers
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »