Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Improving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 11:51am
data privacy
two stage encryption
Servers
security
Scalability
pubcrawl
privacy improvement
policy-based governance
outsourcing
Multi Stage encryption
KP-ABE
key policy-ABE
fine grained access control policy
encryption
Data Security
Access Control
Cryptography
CP-ABE
computer access
collaboration
cloud partial shuffling
cloud data
Cloud Computing
Ciphers
cipher text-ABE
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
authentication
AES
access control model
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 11:50am
key exposure
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
revocation
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
power engineering computing
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
Ciphers
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
biblio
A CP-ABE Scheme Supporting Attribute Revocation and Policy Hiding in Outsourced Environment
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
attribute base encryption
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
policy hiding
outsourced environment
mobile terminals
mobile end
lightweight decryption
data outsourcing (key words)
CP-ABE scheme
component
attributes revocation
attribute revocation
Ciphers
algorithm analysis
CP-ABE
policy-based governance
pubcrawl
outsourcing
Scalability
Servers
authorisation
Access Control
encryption
Cryptography
biblio
A Security Model for the Enhancement of Data Privacy in Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 10:05am
Scalability
user privacy in the cloud
internet acts
cyberspace data
Access Control
security model
data integrity
data confidentiality
privacy protection
Ciphers
Cloud Computing
Metrics
pubcrawl
Resiliency
Organizations
data privacy
encryption
Data Security
Cryptography
biblio
Energy-Adaptive Lightweight Hardware Security Module using Partial Dynamic Reconfiguration for Energy Limited Internet of Things Applications
Submitted by grigby1 on Fri, 06/26/2020 - 12:17pm
multiple encryption modes
energy limited internet of things applications
energy-adaptive lightweight hardware security module
high power consumption
high security levels
Internet of Things (IoT)
low power consumption
low power IoT applications
low security level
maximum dynamic power dissipation
Encryption Modes
partial dynamic reconfiguration
power 10.08 mW
power budget
power constraint
power-security level trade-off
security level values
security strength
Throughput
composability
Cryptography
encryption
Internet of Things
security
security attacks
Hardware
Data Security
pubcrawl
Ciphers
Metrics
Resiliency
cyber-physical systems
Applicability and Robustness (CAESAR)
Competition for Authenticated Encryption: Security
DPR system
dynamic partial reconfiguration
Dynamic Partial Reconfiguration (DPR)
biblio
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
IoT security
Xilinx platform studio tool
Virtex-5 xc5vfx70t device based platform
Software
secure data transaction
Scalability
RNS implementation
Resiliency
resilience
residue number systems
residue number system (RNS)
residue number system
public key cryptography
pubcrawl
Metrics
IoT Security.
C language
Internet of Things
hardware-software codesign implementation
hardware-software codesign
Hardware software codesign
Hardware
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC cipher
digital signatures
digital signature
compute-intensive components
Communication Systems
Ciphers
biblio
Efficient Technique Image Encryption with Cipher Block Chaining and Gingerbreadman Map
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
efficient technique image encryption
unified average change intensity
testing
secure communication
Resiliency
resilience
pubcrawl
pixel change rate
key cipher block chaining
Image Processing
Gingerbreadman map
encryption
button sensitivity
efficient encryption
digital images
digital image security
Digital Image Crypthography
cyber-physical systems
Cryptography
computer science
composability
Ciphers
cipher block chaining
biblio
DNA and Chaos Based Confusion-Diffusion for Color Image Security
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
image encryption
multimedia files
image pixels
DNA XOR rules
DNA decoding
DNA coding
Diffusion
deoxyribo nucleic acid coding
confusion-diffusion process
Confusion
confused image
column shuffling
colour image encryption
color image security
chaos aided inter-planar row
DNA cryptography
Cryptography
Histograms
chaos
image colour analysis
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
5D Combined Chaotic System for Image Encryption with DNA Encoding and Scrambling
Submitted by aekwall on Mon, 06/22/2020 - 10:28am
DNA cryptography
UACI
tent map
sine map
pixel scrambling
NPCR
logistics map
Henon map
entropy values
DNA scrambling
DNA complementary function
bit scrambling
5D combined chaotic system
5D Chaotic system
DNA encryption
DNA encoding
Cryptography
image sequences
chaotic sequences
image encryption
Histograms
Predictive Metrics
Ciphers
DNA
Entropy
privacy
Image coding
Correlation
pubcrawl
Human behavior
Resiliency
encryption
biblio
A Novel Encryption Algorithm based on DNA Cryptography
Submitted by aekwall on Mon, 06/22/2020 - 10:27am
encoding
plain-text
DNA symmetric cryptography
DNA computing
biocomputing
DNA cryptography
confidential data
encryption algorithm
cryptographic algorithm
encryption process
Cryptography
Predictive Metrics
Ciphers
DNA
privacy
pubcrawl
Human behavior
Resiliency
information security
encryption
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »