Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
file organisation
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 11:26am
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
Towards Blockchain-Based Scalable and Trustworthy File Sharing
Submitted by grigby1 on Fri, 02/08/2019 - 3:36pm
ensures confidentiality
Writing
Trustworthy Systems
trustworthy file sharing
Trusted Computing
scalable key management mechanism
revoked users
Resiliency
resilience
pubcrawl
proxy re-encryption based design
Peer-to-peer computing
malicious behaviour
files integrity
file organisation
file encryption keys
Access Control
encryption
encrypted file sharing
distributed proxies
distributed ledgers
distributed access control
data management
cyber physical systems
Cryptography
cryptocurrency
composability
blockchain- based file storage systems
blockchain technology
Bandwidth
authorisation
auditable information
biblio
Development of a Secure, Heterogeneous Cloud Robotics Infrastructure: Implementing a Mesh VPN and Robotic File System Security Practices
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
secure cloud robotics infrastructure
multipoint-to-multipoint virtual private network
onboard processing power
open-source system
OpenVPN
pubcrawl
Resiliency
Robot Operating System
robot programming
Robot sensing systems
robotic file system security practices
ROS
mobile robots
security
security of data
Servers
TurtleBot
Ubuntu
UFW
Virtual private networks
vpn
Windows
Windows Operating System Security
heterogeneous mobile robotic platforms
android
Android (operating system)
Cloud Computing
Cloud Robotics
composability
Compositionality
control engineering computing
file organisation
Heterogeneous
heterogeneous cloud robotics infrastructure
Operating systems security
Human Factors
Internet of Things
ios
iOS (operating system)
iOS Security
IoT
Linux
mesh VPN
Metrics
Microsoft Windows (operating systems)
biblio
A tool to compute approximation matching between windows processes
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
digital forensics scenarios
Windows Operating System Security
windows processes
Windows memory dump
Windows
volatility
memory image file
image matching
Image forensics
forensics memory image
Forensics
forensic memory analysis
forensic analysis
file organisation
executable file
dumping process
tools
cryptographic hashing functions
cryptographic hash values
bytewise approximate matching
Binary codes
approximation matching algorithms
Approximation algorithms
Microsoft Windows (operating systems)
microsoft windows
Cryptography
malware
composability
Resiliency
Metrics
pubcrawl
biblio
Data management and searching system and method to provide increased security for IoT platform
Submitted by grigby1 on Mon, 06/11/2018 - 2:37pm
Peer-to-peer computing
telecommunication security
simulation
signature
Servers
Security Properties
searching system
Scalability
Resiliency
resilience
Public key
pubcrawl
Proof-of-work
Ports (Computers)
blockchain
Named Data Network Security
IP networks
Internet of Things
Human behavior
Hash Function
file organisation
digital signatures
Databases
data management system
data management
data integrity
Cryptography
biblio
An Experimental Study of Four Methods for Homology Analysis of Firmware Vulnerability
Submitted by K_Hooper on Wed, 04/04/2018 - 8:59am
Libraries
vulnerability detection
vulnerabilities
tools
third-party libraries
string matching
string feature matching
security
Resiliency
public domain software
pubcrawl
power grid vulnerability analysis
normalized compression distance
Microprogramming
Metrics
Binary difference analysis
Internet of Things
Human behavior
homology analysis
fuzzy set theory
fuzz hash
firmware vulnerability
firmware
File systems
file organisation
feature extraction
embedded device
development kits
Compositionality
code reuse
biblio
A Practical One-Time File Encryption Protocol for IoT Devices
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
security issues
OTFEP
privacy issues
Protocols
pubcrawl
Resiliency
Scalability
scalable one-time file encryption protocol
secure key distribution mechanism
node scalability
security protocol
Servers
small file
specialized security requirements
stream file
system manager
third-party auditors
file encryption
cryptographic techniques
data privacy
Data protection
database
database management systems
Electronic mail
Elliptic curve cryptography
encryption
Cryptographic Protocols
file organisation
file protection
Internet of Things
IoT
IoT devices
IoT environment
Metrics
biblio
"A Mutual Authentication Security RFID Protocol Based on Time Stamp"
Submitted by grigby1 on Thu, 02/23/2017 - 11:03am
privacy security
time stamps
time stamp
security of data
security authentication protocol
RFID technology
RFID
pubcrawl170105 radiofrequency identification
Protocols
PRNG
authentication
privacy
mutual authentication security RFID protocol
mutual authentication
Hash Function
file organisation
encryption
Databases
Cryptographic Protocols
biblio
"Caesar: high-speed and memory-efficient forwarding engine for future internet architecture"
Submitted by grigby1 on Tue, 02/21/2017 - 11:09am
hashing scheme
ternary content addressable memory
routing update
Routing protocols
Routing
Reliability
pubcrawl170103
protocol
Memory management
memory access
IPv6 TCAM-based solution
IP networks
internet
Information filters
Bloom filter
hash computation
future Internet architecture
forwarding state
forwarding engine
file organisation
data plane device
content-addressable storage
clean slate design
Caesar
Border Routers
border router
Bloom filters
biblio
Density Sensitive Hashing
Submitted by BrandonB on Wed, 05/06/2015 - 11:04am
locality sensitive hashing
Vectors
search problems
random projection
Quantization (signal)
projective function
principal component analysis
Nearest neighbor searches
LSH
Binary codes
high dimensional nearest neighbor search
geometric structure
file organisation
Entropy
DSH
density sensitive hashing
Databases
clustering
« first
‹ previous
1
2
3
4
next ›
last »