Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Public key
biblio
A dense state search method in edge computing environment
Submitted by grigby1 on Fri, 04/01/2022 - 12:10pm
signal processing
collaboration
pubcrawl
resilience
Resiliency
authentication
composability
edge computing
Signal processing algorithms
Public key
Secure storage
Image edge detection
searchable encryption
Search methods
cloud-side collaboration
biblio
Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain
Submitted by aekwall on Fri, 02/25/2022 - 9:42am
blockchain
blockchains
Compositionality
Elliptic curves
Generators
Online banking
Predictive Metrics
Protocols
provable security
pubcrawl
Public key
Resiliency
Steganography
biblio
An Extensive Web Security Through Cloud Based Double Layer Password Encryption (DLPE) Algorithm for Secured Management Systems
Submitted by grigby1 on Thu, 02/24/2022 - 11:20am
Software
security
Scalability
Public key
pubcrawl
Privacy Policies
Memory
Human behavior
encryption
Double Layer Password Encryption (DLPE)
Distributed databases
decryption
cloud framework
Cloud Computing
biblio
Certificateless Peer-to-Peer Key Agreement Protocol for the Perception Layer of Internet of Things
Submitted by grigby1 on Tue, 02/22/2022 - 12:24pm
Protocols
Trusted Computing
sensors
Scalability
Resiliency
resilience
Reliability engineering
Public key
pubcrawl
peer to peer security
performance evaluation
peer-to-peer security
Metrics
key agreement
Human Factors
Costs
combine public key
certificateless
biblio
Let’s Attest! Multi-modal Certificate Exchange for the Web of Trust
Submitted by grigby1 on Mon, 01/31/2022 - 4:39pm
composability
OpenPGP
Key exchange
certificates
transport protocols
web of trust
timing
Public key
metadata
privacy
PKI
internet
Ecosystems
Scalability
Resiliency
resilience
Metrics
pubcrawl
biblio
Access Control Scheme Supporting Attribute Revocation in Cloud Computing
Submitted by aekwall on Tue, 01/25/2022 - 2:54pm
Cloud Computing
data privacy
attribute-based encryption
encryption
Access Control
Public key
pubcrawl
Scalability
Human behavior
policy-based governance
Market research
Costs
attribute revocation
biblio
A Dual Approach for Preventing Blackhole Attacks in Vehicular Ad Hoc Networks Using Statistical Techniques and Supervised Machine Learning
Submitted by aekwall on Mon, 01/10/2022 - 11:54am
Receivers
Attack vectors
VANETs
ROC
f1-score AODV
Blackhole
AUC
Accuracy
denial-of-service attack
vehicular ad hoc networks
Measurement
Human behavior
Resiliency
Scalability
pubcrawl
Public key
machine learning
Support vector machines
Robustness
biblio
Security Enhancements to Subscriber Privacy Protection Scheme in 5G Systems
Submitted by aekwall on Mon, 01/10/2022 - 11:48am
Asymmetric Encryption
Compositionality
Resiliency
the 3rd Generation Partnership Project (3 GPP)
Subscription Permanent Identifier (SUPI)
Subscription Concealed Identifier (SUCI)
replay attack
home automation
guess attack
Elliptic Curve Integrated Encryption Scheme (ECIES)
security
Human behavior
Metrics
pubcrawl
Public key
Wireless communication
encryption
5G mobile communication
privacy
biblio
Application of Bio-inspired Algorithms to the Cryptanalysis of Asymmetric Ciphers on the Basis of Composite Number
Submitted by aekwall on Mon, 01/10/2022 - 11:47am
RSA
Compositionality
Resiliency
quadratic sieve
integer factorization
Genetics
genetic algorithm
fitness function
bio-inspired algorithms
Asymmetric Encryption
Reliability
genetic algorithms
Prototypes
Approximation algorithms
Human behavior
Metrics
pubcrawl
Public key
encryption
biblio
Degree-sequence Homomorphisms For Homomorphic Encryption Of Information
Submitted by aekwall on Mon, 01/10/2022 - 11:46am
Lattices
Compositionality
Resiliency
topological coding
public-key encryption
Homomorphic encryption
graph homomorphism
asymmetric encryption algorithm
Asymmetric Encryption
Controllability
automation
encoding
Human behavior
Metrics
pubcrawl
Public key
Conferences
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »