Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
An Attribute Revocable CP-ABE Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Cloud Computing
Subset Cover
storage management
Scalability
RCP-ABE scheme
pubcrawl
policy-based governance
fine-grained attributes
Cryptography
CP-ABE
collaboration
cloud storage environment
Access Control
ciphertext storage
ciphertext sharing
ciphertext policy
ciphertext access control
Big Data
authorisation
attribute revocation
attribute revocable CP-ABE scheme
attribute encryption scheme CP-ABE
attribute encryption
biblio
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
data structures
Servers
security threats
Scalability
pubcrawl
policy-based governance
NDN environment
NDN
named data networking
information-centric networking
information caching
ICN project
hash table data structure
hash table
fine-grained access control
encryption
Access Control
data segmentation
data privacy
data management
Cryptography
CP-ABE access control scheme
CP-ABE
content publishers
content distribution
computer network security
collaboration
CipherText Policy Attribute Based Encryption
CHTDS
automation
authorisation
biblio
A Flexible Secure Key Delegation Mechanism for CP-ABE with Hidden Access Structure
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
hidden access policy
unauthorized data access
storage management
specified access control
Scalability
Public key
pubcrawl
policy-based governance
Organizations
Logic gates
key delegation
hidden access structure
Access Control
Generators
flexible secure key delegation mechanism
fine grained access control
encryption
Cryptography
CP-ABE schemes
CP-ABE
collaboration
ciphertext policy attribute
authorisation
anonymity
biblio
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Internet of Things
valid users
scalable revocation
Scalability
resource-constrained IoT devices
resource constraints
related schemes
pubcrawl
portable devices
policy-based governance
mobile-based selective sharing
mobile computing
malicious users
IoT
Internet of Things device
authorisation
Cryptography
CP-ABE
constant size CP-ABE
constant number
constant ciphertext length CP-ABE scheme
constant ciphertext
constant cipher-text
collaboration
ciphertext-policy attribute encryption scheme
chosen ciphertext attack secure
CCA-secure
CCA secure proxy-based scalable revocation
C-PROSRCC scheme
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
KP-ABE with Attribute Extension: Towards Functional Encryption Schemes Integration
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
key policy attribute based encryption
Vectors
searchable encryption
Scalability
pubcrawl
Probabilistic logic
policy-based governance
optimization
optimisation
KP-ABE-AE scheme
KP-ABE
key-policy attribute-based encryption with attribute extension
key-policy attribute-based encryption
Access Control
Iron
IPE schemes
Identity-based encryption
functional encryption scheme integration
functional encryption
fine-grained access control
encryption
Cryptography
collaboration
authorisation
access policy
access policies
biblio
Collaborative KP-ABE for cloud-based Internet of Things applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
Internet of Things
Trusted Computing
trusted assistant nodes
storage management
storage capacities
Servers
sensors
security scheme
Scalability
resource-limited networks
pubcrawl
policy-based governance
Performance analysis
KP-ABE
key-policy attribute-based encryption
key policy attribute based encryption
Access Control
encryption
Cryptography
cryptographic scheme
computer network security
collaborative KP-ABE
collaboration
cloud-based IoT applications
cloud-based Internet of Things applications
cloud servers
cloud resources
Cloud Computing
C-KP-ABE
authorisation
Asymmetric Encryption
access control solutions
biblio
Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
KP-ABE
threshold grouping-proofs
Security analysis
Scalability
RFID systems
radiofrequency identification
Public key
pubcrawl
policy-based governance
Pairing Cryptography
message encryption
KP-ABE protocol
Access Control
key-policy attribute-based encryption
key policy attribute based encryption
IoT applications
Internet of Things
grouping-proofs based access control
Grouping proofs
encryption
Cryptographic Protocols
collaboration
authorize NFC payment
authorisation
biblio
Comparative study on KP-ABE and CP-ABE algorithm for secure data retrieval in military network
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
Key Managements
war zone
secure data retrieval
Scalability
remote devices
reliable data transmission
Reliability
pubcrawl
policy-based governance
military network
military computing
military communication
KP-ABE
key revocation
key policy attribute based encryption
attribute based encryption
Key Escrow
encryption
Disruption-Tolerant systems
disruption-tolerant networks
Decentralized Networks
Cryptography
CP-ABE algorithm
computer science
computer network reliability
collaboration
cipher text approach
authorisation
Attribute Revocation and Attribute Based Encryption
biblio
KP-ABE Based Verifiable Cloud Access Control Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
mobile internet
XACML policy
XACML
verifiable computation
user private key revocable key policy attribute based encryption scheme
Scalability
public verifiable computation protocol
public verifiable cloud access control scheme
Public key
pubcrawl
private key cryptography
policy-based governance
nonmonotonic access structure
Access Control
mobile devices
mobile computing
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Games
encoding
collaboration
Cloud Computing
authorization policy
authorisation
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »