Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
outsourcing
biblio
Restricting Switching Activity Using Logic Locking to Improve Power Analysis-Based Trojan Detection
Submitted by grigby1 on Wed, 02/26/2020 - 3:38pm
pubcrawl
logic locking method
malicious circuits
million-gate circuits
outsourcing
PCA-based HT detection methods
power analysis-based Trojan detection
power consumption
power consumption analysis
Power demand
principal component analysis
Process Variations
logic locking
resilience
security
semiconductor companies
small sub-circuit collection
supply chain security
Switches
system-on-chip
trojan horse detection
Trojan horses
untrustworthy fabs
hardware Trojan detection
policy-based governance
composability
IP piracy
circuit block extraction
circuit power
cyber physical systems
design for hardware trust
fabrication foundries
gate level
Hardware
Hardware Security
Resiliency
hardware Trojan threat
HT activity
HT power
HT-infected circuits
industrial property
integrated circuit layout
intellectual properties
invasive software
IPS
Logic gates
biblio
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Submitted by grigby1 on Tue, 01/07/2020 - 9:55am
repeated encryption
multiuser searchable encryption scheme
outsourced encrypted data
outsourcing
PS
pubcrawl
Public key
query processing
query transformation
multiple owners
resilience
Resiliency
SE schemes
search operation
secure proxy server approach
Servers
user queries
cyber physical systems
attribute-based encryption
authorisation
Broadcast Encryption
Cloud Computing
cloud data
composability
Cryptography
Cyber Physical System
abe
data privacy
document handling
efficient encryption
encryption
Euclidean distance
existing SE approaches
Indexes
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
intensive data computing
trust
storage
security solution
security schema
security
secured outsourcing
Resiliency
resilience
pubcrawl
protection
private data
privacy
outsourcing
Metrics
Internet service
Cloud Computing
integrity
Human behavior
encryption
encoding
DNA cryptography
DNA
data center
Cryptography
confidentiality
completely secure migration
cloud service providers
cloud provider
cloud computing technology
cloud computing paradigm
biblio
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
Submitted by aekwall on Mon, 12/09/2019 - 11:22am
low-overhead trust computing algorithms
information entropy
IoT edge computing applications
IoT edge computing architecture
IoT edge devices
largescale IoT edge computing
lightweight trust computing mechanism
lightweight trust evaluating mechanism
lightweight trust mechanism
global trust calculation
multi-source feedback information fusion
multisource feedback information fusion
objective information entropy theory
outsourced computing services
reliable trust computing mechanism
trust calculation mechanism
trust computing mechanism
Computing Theory and Trust
Entropy
Cloud Computing
Internet of Things
security
Trusted Computing
pubcrawl
composability
Computational modeling
Reliability
security of data
sensor fusion
edge computing
Compositionality
outsourcing
Computational efficiency
feedback information fusion algorithm
feedback trust
biblio
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
secure scheme
Outsourced Database
outsourcing
privacy
privacy concerns
pubcrawl
query processing
query results
result integrity
scalable scheme
one-dimensional query
secure tree index
Servers
SQL
SQL queries
sublinear query time
tree data structures
verifiability
verifiable range queries
database management systems
Metrics
composability
Resiliency
cloud adoption
Cryptography
data encryption
data outsourcing
data privacy
Outsourced Database Integrity
efficiency
efficient range queries
encrypted data
formal security analysis
Indexes
Multi-dimensional range query
multidimensional data records
multidimensional range query
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query results for Cloud Databases
Submitted by aekwall on Mon, 11/25/2019 - 1:11pm
metadata
Outsourced Database Integrity
trusted authority
secure scheme to provide confidentiality and integrity of query
SCIQ-CD
database service providers
database queries
database outsourcing
Database as a service
data confidentiality
cloud databases
outsourcing
data integrity
database management systems
Cloud Computing
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
Trusted Computing
cloud storage
data privacy
encryption
Cryptography
authorisation
biblio
Outsourced Private Function Evaluation with Privacy Policy Enforcement
Submitted by aekwall on Mon, 11/11/2019 - 10:47am
evaluator policy
Private Function Evaluation
private data
privacy policy enforcement
Privacy Policies
Policy Oblivious Encryption
personalized medication
outsourcing
outsourced private function evaluation
OPFE-PPE
hospitals
Homomorphic encryption
Genetics
genetic epidemiology
Cloud Computing
drugs
data contributor
client policy
attribute-based encryption
privacy
pubcrawl
Human behavior
machine learning
learning (artificial intelligence)
data privacy
encryption
Cryptography
Scalability
biblio
Routing Aware and Runtime Detection for Infected Network-on-Chip Routers
Submitted by grigby1 on Mon, 11/04/2019 - 11:39am
NoC
Trojan horses
system-on-chip
System recovery
security attacks
security
secure routing algorithm
secret key leaking
runtime detection
Runtime
Routing
Router Systems Security
Resiliency
resilience
pubcrawl
outsourcing
network on chip security
network-on-chip architecture
network-on-chip
network routing
Multiprocessors System-on-Chip
multiprocessing systems
MPSoC
Metrics
Malicious-tolerant Routing Algorithm
malicious Hardware Trojans
logic design
invasive software
integrated circuits
hardware trojan
Hardware
biblio
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control
Submitted by grigby1 on Thu, 09/26/2019 - 9:43am
decentralized safety administration
Security analysis
Secure File Sharing
Safety
Resiliency
resilience
pubcrawl
Peer-to-peer computing
outsourcing data
outsourcing
Metrics
Human Factors
Human behavior
fine-grained data access control
encryption
Distributed databases
Access Control
Data Security
data integrity
Cryptography
CP-ABE
composability
cloud storage
cloud service provider
cloud server
Cloud Computing
ciphertext-policy attribute based encryption
blockchains
blockchain-based secure cloud file sharing scheme
blockchain technology
blockchain
authorisation
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »