Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Proposals
biblio
Lightweight Protection of User Identity Privacy Based on Zero-knowledge Proof
Submitted by aekwall on Mon, 01/20/2020 - 11:13am
Scalability
Protocols
Resiliency
pubcrawl
policy-based governance
privacy
authentication
password
Proposals
data privacy
Human Factors
zero trust
biblio
Modeling and evaluation of a new IoT security system for mitigating DoS attacks to the MQTT broker
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
low power devices
DoS attacks
generic IoT system
high interaction
high mobility
host Intrusion Detection System
human activities
human control
Internet of Things phenomenon
IoT security system
Denial of Service attacks
Message Queue Telemetry Transport protocol
MQTT
MQTT broker
queueing theory
security over IoT
structured activities
telemetry
actuator security
Human behavior
computer network security
IDS
Monitoring
Internet of Things
security
Protocols
transport protocols
Resiliency
IoT
pubcrawl
composability
Metrics
quality of service
Proposals
Floods
DoS
actuators
biblio
Lifespan Design of Conversational Agent with Growth and Regression Metaphor for the Natural Supervision on Robot Intelligence
Submitted by aekwall on Mon, 12/16/2019 - 1:27pm
Metrics
Synthetic sensor
supervision process
Scalability
Robot sensing systems
robot intelligence
regression metaphoric interaction design
regression metaphor
regression analysis
real-time activity events
pubcrawl
Proposals
online labeling activity
natural supervision
conversation agents
lifespan design
learning (artificial intelligence)
Labeling
interaction design principle
intelligent robots
human-robot interaction
human computer interaction
Human behavior
Growth and regression metaphor
Data labeling
conversational agents
conversational agent
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
A Security Mechanism in DSR Routing for MANET
Submitted by grigby1 on Mon, 09/09/2019 - 9:56am
Resiliency
mobile ad hoc networks
mobile ad-hoc network
mobile nodes
prevention mechanism
Proposals
pubcrawl
radio range
reactive routing protocols
resilience
Metrics
route diversion
Routing Protocol
Routing protocols
RREP
security mechanism
security threads
source address
telecommunication security
wrong destination address
GDH
bandwidth constraint multihop wireless network
Compositionality
Conferences
Cryptographic Protocols
data communication
Destination address
Dsr
DSR Routing
dynamic source routing
autonomous collection
group Diffie-Hellman key management
Hash Function
intended required destination
intermediate node
intermediate trusted node start
malicious node
MANET
MANET routing
MANET security
biblio
Coverage-Based Heuristics for Selecting Assessment Items from Security Standards: A Core Set Proposal
Submitted by grigby1 on Mon, 07/01/2019 - 9:05am
Resiliency
Systematics
system security
standards
Standard
security standard
security property
security of data
Security Heuristics
security characteristics
security assessment heuristics
security assessment designs
security aspects
security
Scalability
Assessment
resilience
pubcrawl
Proposals
Ontology
Ontologies
ISO standards
information security
IEC standards
high-coverage assessment designs
Heuristics
coverage
assessment dimensions
Assessment Dimension
biblio
A Consideration of an Efficient Arithmetic Over the Extension Field of Degree 3 for Elliptic Curve Pairing Cryptography
Submitted by aekwall on Wed, 05/01/2019 - 11:37am
Gaussian processes
Vectors
Scalability
Resiliency
Random access memory
public key cryptography
pubcrawl
Proposals
Metrics
Conferences
finite element analysis
Elliptic curves
elliptic curve pairing cryptography
Elliptic curve cryptography
Cyclic Vector Multiplication Algorithm
cubic extension
Cryptography
biblio
Pedigree-Ing Your Big Data: Data-Driven Big Data Privacy in Distributed Environments
Submitted by grigby1 on Wed, 03/06/2019 - 3:26pm
Data-driven big Data privacy
target big data repositories
summary data representatives
security-inspired protocols
security of data
pubcrawl
Protocols
protocol checking
Proposals
distributed processing
distributed environments
Distributed databases
data-driven privacy-preserving big data management
Big Data
data-driven aggregate-provenance privacy preserving big multidimensional data
data privacy
Data models
data analysis
computational overheads
Cloud Computing
Big Multidimensional Data
Big Distributed Data
Big Data Systems
big data privacy
Big Data Applications
biblio
Detecting Cache-Timing Vulnerabilities in Post-Quantum Cryptography Algorithms
Submitted by grigby1 on Thu, 02/14/2019 - 10:19am
NIST post-quantum cryptography project submissions
validation tools
tools
taint analysis
static analysis
source code
quantum cryptography
pubcrawl
Proposals
program diagnostics
post-quantum cryptography algorithms
NIST post-quantum standardization project
cache storage
NIST
Metrics
leakage pattern detection
execution behavior
encryption
development cycle
dedicated vulnerability research tool
cryptographic algorithms
composability
cache-timing vulnerabilities
cache-timing attacks
biblio
A blockchain-based data usage auditing architecture with enhanced privacy and availability
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
distributed infrastructures
untrusted servers
unauthorized users
tamper-proof evidences
security breaches
Resiliency
resilience
pubcrawl
Proposals
privacy-preserving fashion
Peer-to-peer computing
network accountability
Metrics
hierarchical identity based cryptographic mechanisms
auditable contracts
data usage compliance
data sharing
data privacy
data owners
data access
Cryptography
contracts
composability
blockchain-based data usage auditing architecture
blockchain infrastructures
authorization
authorisation
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »