Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Indexes
biblio
Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound
Submitted by grigby1 on Fri, 09/18/2020 - 1:46pm
Telecommunications
δ)-LRC classification
δ)-locally repairable codes
ternary codes
Singleton-like bound
r
q-ary LRC
optimal ternary LRC
optimal ternary (r
optimal ternary (n
linear code
k
code symbol
coding theory
information security
linear codes
human computer interaction
Upper bound
error correction codes
Compositionality
Metrics
Cryptography
Indexes
Generators
Resiliency
resilience
pubcrawl
security
biblio
Secure Authentication Mechanism for Resistance to Password Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
Dictionaries
brute force attacks
shoulder surfing
password based authentication mechanism
password attacks
matrix based secure authentication mechanism
Matrix based authentication
key stroke technique
graphichical password technique
dictionary attacks
click pattern technique
Brute forcing
Cryptography
Resists
matrix algebra
policy-based governance
Human Factors
password
Force
pubcrawl
authentication
Indexes
authorisation
biblio
Research on the Destructive Capability Metrics of Common Network Attacks
Submitted by grigby1 on Fri, 08/28/2020 - 3:54pm
improved AHP judgment matrix
security
Scalability
Rough sets
rough set theory
Resiliency
resilience
pubcrawl
network index data
network attacks
network attack metrics system
Metric System
matrix algebra
Indexes
improved network metric data
Computing Theory
destructive capability metrics
destructive capability
computer network security
Communication networks
common network attacks
common attack Smurf
big data security metrics
attack type-attack attribute-attack atomic operation-attack metrics
Atomic measurements
Atomic layer deposition
analytic hierarchy process
AHP algorithm
Security Metrics
biblio
ClustCrypt: Privacy-Preserving Clustering of Unstructured Big Data in the Cloud
Submitted by grigby1 on Fri, 08/28/2020 - 3:34pm
resilience
big data security in the cloud
unstructured
topic-based clustering
secure cloud-based semantic search system
privacy-preserving data clustering
encrypted unstructured big data
clustering methods
ClustCrypt
client-side encryption
big data security
Scalability
pattern clustering
clustering
Data Analytics
Cryptography
Metrics
data encryption
Big Data
cloud services
Cloud Computing
data privacy
Indexes
Resiliency
pubcrawl
data analysis
Organizations
privacy
encryption
biblio
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Indexes
text analysis
searchable encryption
Scalability
ranked search
pubcrawl
program testing
policy-based governance
multikeyword ranked searchable encryption
multi-keyword search
IoT devices
Internet of Things
ciphertext searching
Frequency modulation
encryption
encrypted data
data privacy
Cryptography
CP-ABE test
CP-ABE
collaboration
Cloud Computing
ciphertext-policy attribute-based encryption test
ciphertext-policy attribute-based encryption
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
arrays
user privacy in the cloud
text searching
string matching problem
simple data structure
semitrusted cloud providers
privacy-preserving matching algorithm
privacy preserving pattern
index arrays
encrypted index
distributed cloud-based datasets
distributed cloud-based data storage
privacy preserving
confidentiality
Cloud Computing
storage management
Scalability
Indexes
data structures
pattern matching
Distributed databases
Metrics
pubcrawl
Resiliency
data privacy
user data
Cryptography
biblio
Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
path-based dissimilarity function
Walk2Privacy mechanism
Walk2Privacy algorithm
Task Analysis
Target link privacy preserving
target link privacy disclosure
Switches
submodularity property
social networking (online)
self-avoiding random walk
scale social graphs
Scalability
pubcrawl
privacy
adversarial link prediction
monotonicity property
Link prediction
Link deletion.
Indexes
greedy link deletion
Graph utility
graph theory
GLD2Privacy mechanism
data privacy
data deletion
Computational modeling
Big Data
biblio
An Efficient Image Encryption Using Chaos Theory
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Image coding
turmoil hypothesis
section astute rearranging
Resiliency
resilience
push savvy rearranging
pubcrawl
pixel substitution
pixel shuffling
pixel replacement
pixel rearranging
Indexes
image encryption
bit-XOR activity
Entropy
encryption
efficient encryption
disorder hypothesis
decryption
cyber-physical systems
Cryptography
control systems
Conferences
composability
chaos theory
chaos
biblio
Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
source coding
pubcrawl
public channel
public key cryptography
Relays
resilience
Resiliency
Scalability
secret keys
security
policy-based governance
source coding scheme
source sequences
source-type model
telecommunication security
Telecommunications
trusted helper
untrusted helper
Upper bound
Indexes
cooperative communication
cooperative key generation
cooperative two-key generation
Decoding
discrete memoryless sources
five-terminal system
generated keys
Human behavior
Human Factors
channel capacity
information theoretic security
information-theoretic security
key capacity region
key leakage rate
Metrics
partial-trusted helpers
passive eavesdropper
physical layer security
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »