Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
polynomials
biblio
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:29pm
IBS
Information Centric Networks
polynomials
user privacy
secret sharing
telecommunication network planning
Identity-based encryption
content distribution
IBE
information-centric networking
IBSS
identity-based secret sharing access control framework
next generation network design
polynomial degree
request-response communication mode
secure identity encryption
Shamir's secret sharing method
pubcrawl
Scalability
Access Control
authorisation
authorization
Cryptography
encryption
data privacy
Resiliency
computer network security
privacy
internet
delays
user identity
Next generation networking
next generation networks
ICN
biblio
Hardware Design of Polynomial Multiplication for Byte-Level Ring-LWE Based Cryptosystem
Submitted by aekwall on Mon, 03/15/2021 - 11:10am
NIST PQC Standardization Process
BRAMs
byte-level modulus
byte-level ring-LWE based cryptosystem
computational time-consuming block
DSPs
high-level synthesis based hardware design methodology
ideal lattice
LAC
multiplication core
high level synthesis
polynomial multiplication
ring learning with error problem
ring LWE
time 4.3985 ns
time 5.052 ns
time 5.133 ns
Vivado HLS compiler
Xilinx Artix-7 family FPGA
NIST
Scalability
lattice-based cryptography
Cryptography
Hardware
Table lookup
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
field programmable gate arrays
post quantum cryptography
timing
polynomials
Software algorithms
Compositionality
program compilers
compiler security
logic design
biblio
GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
Metrics
telecommunication network topology
synchronisation
SMBMM
security
secure multiparty batch matrix multiplication problem
secure interserver communication
Resiliency
resilience
pubcrawl
polynomials
polynomial sharing
pairwise products
noise alignment
network servers
batch processing
matrix multiplication
master gains no additional information
GCSA-NA
GCSA codes
flexible interserver network topology
Cryptography
Cross Subspace Alignment codes
computer network security
computational complexity
Compositionality
colluding servers
coding theory
codes
biblio
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Submitted by grigby1 on Tue, 12/15/2020 - 12:25pm
blockchain designs
trust-corrupting
truly scalable system
system throughput
sharding proposals
security scalability
PolyShard
polynomially coded sharding
performance scalability
node subsets
linearly scaling efficiency
information-theoretic upper bounds
decentralization scalability
coded storage protocol
coded sharding
Cryptography
coding theory
blockchain system
storage efficiency
information theory
linear codes
Compositionality
polynomials
Protocols
security
Resiliency
resilience
Metrics
pubcrawl
security of data
biblio
An Energy Aware Fuzzy Trust based Clustering with group key Management in MANET Multicasting
Submitted by aekwall on Mon, 11/02/2020 - 1:41pm
pubcrawl
MANET multicasting
manet privacy
member movement
Metrics
mobile ad hoc networks
multicast communication
pattern clustering
Polynomial-based key management
polynomials
Protocols
lower capacity resources
Reliability
repeated node movement
Resiliency
secure multicast transmission
style
telecommunication power management
telecommunication security
trust
trustable environment fuzzy based trust
Energy states
clustered networks
clustering
clustering concepts
Compositionality
considerably stable environment fuzzy based trust
Cryptography
delays
energy aware fuzzy trust
energy consumption
cluster head
Fuzzy based
Fuzzy logic
fuzzy set theory
group key
group key maintenance
Group key management
highest trust
key refreshment
link breakdown
biblio
Deletion Propagation for Multiple Key Preserving Conjunctive Queries: Approximations and Complexity
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
query processing
multiple project-free
multiple queries
nontrivial set
polynomials
privacy
problem funda-mental
pubcrawl
quality management
query feedback
multiple key preserving conjunctive queries
realistic case
repairing data
Scalability
single query case
standard deletion propagation problem
tuples
view propagation
view side-effect
data lineage
Approximation algorithms
approximations
Complexity theory
computational complexity
computer science
conjunctive queries
conjunctive query
data cleaning
data deletion
approximation
Databases
debugging
deletion propagation
dichotomy
dynamic programming
Heuristic algorithms
investigated problem
key preserving
biblio
Secret Sharing Schemes with Hidden Sets
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Metrics
uniform distribution
telecommunication security
Shamirs secret sharing scheme
set theory
Resiliency
resilience
pubcrawl
Protocols
polynomials
polynomial
multifactor authentication
Analytical models
malicious dealer
interpolation
Human Factors
Human behavior
detect hidden sets
Cryptography
Cryptographic Protocols
cryptographic keys
Computers
Computational modeling
cloud providers
biblio
Implementation of Discretionary Security Policy in the Distributed Systems Based on the Secret Sharing Scheme
Submitted by grigby1 on Fri, 04/03/2020 - 11:05am
Blakley's scheme
collaboration
computer network security
discretionary security policy
forbidden information channels
matrix of access.
Policy Based Governance
policy-based governance
polynomials
pubcrawl
secret sharing scheme
Shamir's scheme
sharing secretscheme
telecommunication channels
biblio
Demagnetization Modeling Research for Permanent Magnet in PMSLM Using Extreme Learning Machine
Submitted by aekwall on Mon, 02/24/2020 - 9:54am
permanent magnets (PM)
Fitting
linear modeling method
linear synchronous motors
machine theory
magnetic distribution
permanent magnet motors
permanent magnet synchronous linear motor
permanent magnet synchronous linear motor (PMSLM)
extreme learning machine (ELM)
PM characteristics
PMSLM
polynomial modeling method
temperature 293.0 K to 298.0 K
temperature 300.0 degC
temperature demagnetization modeling method
Temperature distribution
Data models
extreme learning machine
ELM
Demagnetization
Permanent magnets
demagnetisation
finite element analysis
remanence
Compositionality
polynomials
Temperature measurement
power engineering computing
machine learning algorithm
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
Polynomial-based Lightweight Key Management in a Permissioned Blockchain
Submitted by aekwall on Mon, 01/20/2020 - 10:49am
polynomial
transaction confidentiality
telecommunication security
system scalability
security
Scalability
Resiliency
public-key schemes
public-key operations
public-key infrastructure
public key cryptography
pubcrawl
polynomials
polynomial-based schemes
128-bit modulus size
PKI
permissioned blockchain platform
lightweight polynomial-based key management scheme
identity authentication
exponentiation
expensive modular exponentiation operations
data confidentiality
Cryptography
cryptocurrencies
computationally less intensive polynomial evaluation operations
blockchain applications
blockchain
2048-bit RSA
1
2
3
next ›
last »