Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
DeepAttest: An End-to-End Attestation Framework for Deep Neural Networks
Submitted by aekwall on Mon, 08/17/2020 - 11:36am
on-device DNN attestation method
hardware-software codesign
Human behavior
industrial property
intelligent devices
intelligent platforms
IP concern
ip protection
learning (artificial intelligence)
manufactured hardware
neural nets
hardware-level intellectual property
pubcrawl
queried DNN
Resiliency
Software/Hardware Codesign
target platform
TEE-supported platforms
Trusted Execution Environment
unregulated usage
usage control
device provider
application usage
attestation
attestation criterion
authorisation
authorized DNN programs
composability
deep learning frameworks
deep neural networks
DeepAttest overhead
DeepAttest provisions
application program interfaces
device-specific fingerprint
DNN applications
DNN benchmarks
DNN program
embedded fingerprint
end-to-end attestation framework
FP
hardware architectures
hardware-bounded IP protection impair
biblio
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
Submitted by grigby1 on Thu, 08/13/2020 - 5:22pm
revocation overhead
privacy
privacy-preserving authentication
private key cryptography
pseudonymous certificates
pseudonyms
pubcrawl
Public key
resilience
Resiliency
n) threshold secret sharing
Roads
Scalability
secret sharing
Shamir (t
telecommunication security
VANET
vehicular ad hoc networks
vehicular communications
DCS schemes
anonymous messaging
authentication
authentication overhead
authorisation
backward security
certificate revocation list
certificate updating overhead
CPPT
data privacy
anonymous communications
ECPP scheme
EMAP scheme
forward security
framed attacks
hash chain
hash chains
hybrid scheme
message authentication
biblio
Blind Certificate Authorities
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
SMTP servers
public key cryptography
public key registration
resilience
Resiliency
Scalability
SCI protocol
secure channel injection protocols
Secure-Multiparty-Computation
pubcrawl
standard email server implementations
TLS
truly anonymous systems
X.509 Certificate
zero-knowledge certificate
zero-knowledge certificate signing protocol
Zero-knowledge-Proof
Cryptographic Protocols
alice@domain.com
anonymity
anonymous messaging
anonymous proofs
authorisation
authorization
blind certificate authority
certificate binding
account ownership
data privacy
digital signatures
Electronic mail
Gmail
MPC
party encrypted communications
privacy
biblio
A Secure Authentication and Key Establishment Scheme for Wearable Devices
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
resilience
wireless sensor networks
Wireless communication
Wireless body area networks
smart-home
smart-healthcare
Servers
sensors
security shortcomings
secure services
secure mutual authentication
secure authentication
Scalability
Resiliency
anonymous messages
pubcrawl
message authentication
Medical services
lightweight mutual authentication
lightweight anonymous user authentication
legitimate users
key establishment scheme
computer network security
body area networks
authorisation
authentication
anonymous messaging
biblio
Android-Based Smartphone Authentication System Using Biometric Techniques: A Review
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
Face
android encryption
smartphone information leakage
performance index
mobile internet
identity authentication systems
encryption technology
Biometric Recognition
Android-based smartphone authentication system
Android-based biometric verification systems
Android OS accounts
android operation system
algorithmic framework
Metrics
biometric
biometric techniques
Scalability
Humanoid robots
Androids
Android (operating system)
Information Assurance
biometrics (access control)
authentication
smart phones
pubcrawl
Human behavior
Resiliency
feature extraction
Support vector machines
mobile computing
Cryptography
authorisation
biblio
Identity-Based Aggregate Signature Scheme in Vehicle Ad-hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:18am
message authentication
vehicular ad hoc networks
vehicle network
vehicle identity
vehicle anonymity
vehicle ad-hoc network
VANET
telecommunication security
Resiliency
privacy preserving
privacy
Metrics
message signatures
pubcrawl
identity-based aggregate signature scheme
digital signatures
data privacy
Cryptography
Compositionality
Cloud Computing
authorisation
authentication
Aggregates
aggregate signature algorithm
Aggregate Signature
Ad Hoc Network Security
biblio
Robust and Responsive Acoustic Pairing of Devices Using Decorrelating Time-Frequency Modelling
Submitted by aekwall on Mon, 08/03/2020 - 10:16am
Acoustic Fingerprinting
Acoustic Fingerprints
voice-related information
voice user interfaces
Voice User Interface
unified voice user interface
time-frequency representation
natural interaction
decorrelation
decorrelating time-frequency modelling
DCT
audio quality
audio fingerprint
acoustic pairing
authorisation
access management rules
Acoustic signal processing
Time-frequency Analysis
acoustic signal
audio signal processing
user interfaces
user privacy
Robustness
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
A Secure Permissioned Blockchain Based System for Trademarks
Submitted by grigby1 on Thu, 07/30/2020 - 1:53pm
contracts
ip protection
Trademarks
trademark registration
secure trademark system
secure permissioned blockchain
Permissioned
jurisdictions
intellectual property organizations
Hyperledger Fabric
hyperledger
centralized databases
intellectual property
smart contracts
authorisation
composability
Databases
authenticity
Resiliency
resilience
policy-based governance
pubcrawl
Distributed databases
blockchain
organisational aspects
cryptocurrencies
Organizations
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
Improving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
data privacy
two stage encryption
Servers
security
Scalability
pubcrawl
privacy improvement
policy-based governance
outsourcing
Multi Stage encryption
KP-ABE
key policy-ABE
fine grained access control policy
encryption
Data Security
Access Control
Cryptography
CP-ABE
computer access
collaboration
cloud partial shuffling
cloud data
Cloud Computing
Ciphers
cipher text-ABE
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
authentication
AES
access control model
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »