Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 10:18am
smart home service
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
Receivers
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
asymmetric encryption key
public key cryptography
Public key
pubcrawl
private key
performance enhancement
optimal key length
Metrics
mean square error methods
key length
intrusion
home computing
free-space optical communication
encryption
Correlation
asymmetric Rivest-Shamir-Adleman encryption method
biblio
A Study on Hybrid Blockchain-based XGS (XOR Global State) Injection Technology for Efficient Contents Modification and Deletion
Submitted by grigby1 on Fri, 07/10/2020 - 10:41am
Hybrid Blockchain
XOR Global State(XGS)
XOR global state
system trust
smart contracts
Servers
Scalability
Public key
pubcrawl
private key cryptography
privacy breach
privacy
owner private key
modification
metadata
hybrid blockchain-based XGS
append-only distributed ledger
Distributed databases
Distributed Database
deletion
database technology
data privacy
data deletion
create-retrieve-append-burn
CRAB method
contents modification
contents deletion
blockchain
block-chained hybrid blockchain system
authentication
arbitrary modifications
arbitrary injection
biblio
ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things
Submitted by aekwall on Mon, 06/22/2020 - 10:26am
cloud
ROM
produced signature
issued signature
Intenet of Things
ID-based strong designated verifier signature scheme
ID-based signature scheme
Electrical Engineering
Designated verifier signature
designated verifier
BDH
random oracle model
Cloud Computing
sensors
Bilinear Pairing
Smart Home
Public key
digital signatures
pubcrawl
Resiliency
provable security
Internet of Things
digital signature
Scalability
biblio
Code-Based Schemes for Post-Quantum Digital Signatures
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
Complexity theory
quantum security
post-quantum digital signatures
electronic digital signature
code-based schemes
code-based cryptography
CFS scheme
quantum computing
Post-quantum cryptography
Scalability
quantum cryptography
public key cryptography
Public key
digital signatures
Decoding
pubcrawl
Resiliency
digital signature
biblio
A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
bilinear pairings
strong designated verifier
signer ambiguity
signature length
random oracle model
public key system
nontransferability
group-oriented strong designated verifier signature scheme
group-oriented
GO-SDVS scheme
constant-size signatures
constant-size
Scalability
adaptive chosen-message attacks
Oceans
computer science
handwriting recognition
public key cryptography
Public key
digital signatures
Generators
pubcrawl
Resiliency
digital signature
biblio
Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
message exchange
Service robots
service robot
security
Scalability
RSA algorithm
Resiliency
public key cryptography
Public key
pubcrawl
message transmission
message integrity
cloud
message encryption
message decryption
message authentication
intelligent robots
encryption
digital signatures
digital signature algorithm
digital signature
control engineering computing
cloud intelligent robot
Cloud Computing
biblio
Constructing a Digital Signature Algorithm Based on the Difficulty of Some Expanded Root Problems
Submitted by aekwall on Mon, 06/22/2020 - 10:24am
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
computer science
digital signature
digital signature algorithm
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
biblio
A Trust-based Real-time Map Updating Scheme
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
fog node
privacy
Policy-Governed Secure Collaboration
policy-based governance
message source vehicle
malicious vehicles
Internet of Vehicles
high-precision map service
Global Positioning System
pubcrawl
false trust
data privacy
blockchain
Bayesian inference model
automatic driving
anonymity
accurate traffic information
Scalability
trust
traffic information systems
timely traffic information
telecommunication traffic
Sybil attack prevention
Servers
security of data
Security analysis
trust value offset
Roads
road condition information
Resiliency
resilience
real-time systems
real-time map updating
Public key
biblio
ChainFS: Blockchain-Secured Cloud Storage
Submitted by aekwall on Mon, 06/01/2020 - 9:48am
forking attacks
trusted Blockchain
storage management
Servers
security of data
Resiliency
resilience
Public key
pubcrawl
policy-based governance
middleware system
middleware security
middleware
History
Fuses
Amazon S3 cloud storage
fork consistency
file-system interface
file system
file operation logging
composability
cloud-storage security
cloud storage services
cloud storage
Cloud Security
Cloud Computing
ChainFS middleware
ChainFS data file storage
blockchain-secured cloud storage
blockchain
biblio
An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems
Submitted by grigby1 on Fri, 04/17/2020 - 10:28am
pubcrawl
internet
live data forensics
Metrics
microsoft windows
Microsoft Windows (operating systems)
online front-ends
open source tool
postmortem analysis
Forensics
public domain software
Public key
resilience
Resiliency
Web Wallets
Windows Operating System Security
Windows systems
automated forensic process
forensic traces
forensic research
forensic acquisition
Digital Forensics
Cryptographic Hash Function
cryptocurrency forensics
cryptocurrencies
Computer crime
composability
Browsers
bitcoin web wallet
Bitcoin forensics
Bitcoin clients
bitcoin
automated live forensic
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »