Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
decentralize identity management system
TTP
trusted third party
three blockchains identity management
telecommunication security
self-generated identity
self-generated certificates
Scalability
Resiliency
public key cryptography
pubcrawl
Metrics
internet
elliptic curves cryptography
Elliptic curve cryptography
Identity management
Cybersecurity
Cryptographic Protocols
computer network security
computer network management
certificate authority
Blockchains Identity Management
blockchain technology
blockchain
autonomous network
authorisation
authentication server
Authentication Protocols
3BI-ECC
biblio
Online/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing
Submitted by aekwall on Mon, 02/15/2021 - 4:49pm
reusable ciphertext pool
large universe MA-CP-ABE scheme
Multi-Authority Attribute-Based Encryption
online-offline revocable multiauthority attribute-based encryption
Online/Offline Encryption
pubcrawl
q-DPBDHE2 assumption
Resiliency
resource-constrained users
IoT
revocation
revocation mechanism
security problems
users access privilege
users initialization phase
valid ciphertext
waste system resources
authorisation
invalid ciphertext
Internet of Things
illegal ciphertext
fine-grained access control
encryption computational cost
efficient encryption
edge computing
data encryption algorithm
cyber physical systems
Cryptography
cross domain applications
composability
Cloud Computing
Ciphertext Verification.
ciphertext verification
biblio
Covert Channels of Data Communication
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
Compositionality
protected operating system
mandatory access control
Linux operating system
Linux kernel
data communication
covert channels
covert storage channels
confidential information
authorisation
Linux
security threats
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
DNA based Computing Encryption Scheme Blending Color and Gray Images
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
Human behavior
encryption
Encryption Biometric image
encryption key
encryption scheme blending color
face recognition
fingerprint identification
fingerprint image
Fingerprint recognition
gray fingerprint images
DNA sequence
Image coding
Image color analysis
image colour analysis
image sequences
matrix algebra
Predictive Metrics
privacy
pubcrawl
Resiliency
Cipher
resilience
Scalability
Metrics
attacks
authentication
authorisation
biometric image
Blending
blending images
biometric encryption
color images
computing method
Conversions
Cryptography
DNA
DNA computing
DNA computing algorithm
DNA cryptography
biblio
A Blockchain-based Method for Decentralizing the ACME Protocol to Enhance Trust in PKI
Submitted by aekwall on Mon, 02/01/2021 - 11:40am
Public key
digital trust
ethereum
Ethereum blockchain
human interaction
human trust
Internet of Things
PKI model
Protocols
pubcrawl
digital certificates
public key cryptography
public key infrastructure
Public Key Infrastructure model
Servers
trust
trust concerns
trust enhancement
trusted Certificate Authority
automation issue
Resiliency
Scalability
Human behavior
Metrics
ACME
ACME protocol
authorisation
Automated Certificate Management Environment
PKI Trust Models
blockchain
blockchain technology
certificate authority
certificate issuance automation protocol
certification
contracts
conventional security models
current trust issues
biblio
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:03pm
Servers
medical servers
Medical services
message authentication
Metrics
password
pubcrawl
remote monitoring
resilience
Resiliency
medical information systems
Smart card
smart cards
telecare medical information systems
telemedicine
three factor user authentication
Three-factor authentication
TMIS
user anonymity
user/server communication security
e-health systems
authentication
authorisation
AVISPA
biometrics
biometrics (access control)
biometrics based key agreement
composability
diseases
e-health
anonymity
ECG
file servers
formal security verification tool AVISPA
formal verification
health care
health systems
healthcare services
Human behavior
biblio
Session-level Adversary Intent-Driven Cyberattack Simulator
Submitted by grigby1 on Thu, 01/28/2021 - 1:10pm
event-driven simulation model
user access levels
tools
session-level adversary intent-driven cyberattack simulator
Scalability
Resiliency
resilience
request-response session level
pubcrawl
proactive analysis
network infrastructure
Metrics
malware
internet
Human behavior
adversary behavior
Entry points
DEVS
defender
Data models
Cybersecurity
cyberattack
cyber adversary behavior
Bronze Butler APT
authorisation
attackers
APT
Analytical models
Adversary Models
biblio
IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform
Submitted by grigby1 on Wed, 01/20/2021 - 4:22pm
IoT security
Web API
user privacy
unauthorized access
tools
timing
Task Analysis
Smart homes
security
Resiliency
resilience
pubcrawl
program testing
permission verification
IoT-APIScanner
API
IoT devices
Internet of Things
formal verification
data privacy
Compositionality
cloud services
Cloud Computing
cloud API
authorisation
application programming interface
application program interfaces
APIs
API unauthorized access vulnerability detection
API test cases
biblio
Rethinking Authorization Management of Web-APIs
Submitted by grigby1 on Wed, 01/20/2021 - 4:20pm
Mobile Applications
web services
Web APIs
third party web
service providers
security policies
resource sharing
Resiliency
resilience
pubcrawl
mobile computing
API
data fragments
Compositionality
Cloud Computing
cloud applications
authorization management
authorisation
application programming interface
application program interfaces
APIs
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
Fuzzy Keyword Sets
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Indexes
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
Cloud Computing
fuzzy set theory
Fuzzy logic
Data protection
query processing
Metrics
pubcrawl
Resiliency
data encryption
encryption
data confidentiality
Cryptography
authorisation
Keyword search
Servers
Scalability
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »