Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
outsourcing
biblio
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage
Submitted by grigby1 on Thu, 09/26/2019 - 9:27am
ciphertexts
searchable encryption
searchable symmetric encryption
searchable encryptions
queried keyword
matrix-type storage
matrix-type data format
matrix-type data
location-based search
Keyword search
IoT technologies
encrypted domain
encrypted documents
data outsourcing
cloud storages
resilience
Block Cipher
advanced searchable encryption
outsourcing
personal information
Ciphers
information retrieval
storage management
query processing
Cryptography
Servers
Indexes
composability
Resiliency
pubcrawl
biblio
Variation-Aware Hardware Trojan Detection through Power Side-Channel
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
integrated logic circuits
variation-aware hardware Trojan detection
Trojan-to-circuit power consumption
Trojan horses
trojan horse detection
side-channel analysis
Sensitivity
pubcrawl
process variation
power side-channel
Power demand
outsourcing
logic design
invasive software
Clock-tree Partition
integrated circuits
integrated circuit testing
HT detection sensitivity
HT activation chances
hardware trojan
Hardware
fine-grain circuit partitioning
Equal-power Partition
Detection sensitivity
Detectability
Cryptography
Clocks
biblio
Hardware Trojan Detection Using Path Delay Order Encoding with Process Variation Tolerance
Submitted by grigby1 on Fri, 03/15/2019 - 10:59am
Logic gates
variation-tolerant path delay order encoding technique
Trojan horses
trojan horse detection
security threats
security
pubcrawl
process variation tolerance
path delay information
outsourcing
delays
HT detection techniques
Hardware Trojans
hardware Trojan detection
Hardware
Foundries
fabrication
encoding
DfT
design-for-trust techniques
biblio
Designing Subspecies of Hardware Trojans and Their Detection Using Neural Network Approach
Submitted by grigby1 on Fri, 03/15/2019 - 10:58am
learning (artificial intelligence)
true positive rate
Trojan horses
trojan horse detection
trigger circuits
TPR
third-party vendors
pubcrawl
outsourcing
neural-network based hardware-Trojan detection method
neural network approach
neural network
neural nets
machine-learning-based hardware-Trojan detection method
machine learning
Logic gates
Artificial Neural Networks
invasive software
integrated circuit design
high-performance hardware device
hardware trojan subspecies designing
hardware trojan
hardware devices mass-production
Hardware
gradient methods
gate-level netlist
feature extraction
electronic engineering computing
electric devices
Design Time
Benchmark testing
biblio
An Efficient CPA-Secure Encryption Scheme with Equality Test
Submitted by grigby1 on Fri, 09/28/2018 - 3:20pm
multiplicative homomorphism
zero knowledge proof
Resiliency
resilience
public key solutions
public key cryptography
Public key
pubcrawl
Protocols
Probabilistic logic
OW-CPA security
outsourcing
noninteractive zero knowledge proof of discrete log
comparable ciphertext
message encryption
IND-CPA security
Homomorphic encryption
equality test token
encryption scheme with equality test
encryption
ElGamal encryption
efficient encryption
efficient CPA-secure encryption scheme
data outsourcing scenario
cyber physical systems
composability
biblio
Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 11:24am
public cloud storage
internet
outsourcing
outsourcing protocol
Policy
privacy
Privacy Policies
Protocols
pubcrawl
integrity
QP Protocol
Quadratic programming
Scalability
secure outsourcing
secure protocol
security of data
storage management
clients cloud provider
information technology
Human behavior
encryption
data storage
data security correctness
data privacy
data confidentiality
confidentiality
computer user
computer system
cloud technology
cloud computing technology
cloud computing data storage technology
Cloud Computing
cloud access
biblio
Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Submitted by K_Hooper on Wed, 05/09/2018 - 9:56am
outsourcing data services
security shortage
security problems
Security Audits
Security analysis
Secure storage
secure cloud storage
Scalability
Resiliency
Public key
public integrity auditing
public auditing scheme
public auditing
pubcrawl
Privacy-preserving
Cloud Computing
outsourcing
Mathematical model
low computational audit cost
integrity
Human behavior
Forgery
dynamic-hash-table based public auditing
dynamic hash table
dynamic data
data structure DHT
data blocks
Cryptography
cryptanalysis
countermeasures
biblio
Programmable Assertion Checkers for Hardware Trojan Detection
Submitted by grigby1 on Wed, 04/11/2018 - 2:01pm
outsourcing
VLSI chips
Trojan horses
trojan horse detection
system-on-chip
system on chip
SoC
security of data
Resiliency
resilience
pubcrawl
programmable logic fabric
programmable logic arrays
programmable assertion checkers
product development
circuit complexity
Monitoring
manufactured product security
manufactured product authenticity
integrated circuit design
hardware Trojan detection
hardware assertion optimization
Hardware
field programmable gate arrays
design complexity
cyber physical systems
cost reduction
composability
Circuit synthesis
circuit designers
biblio
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
internet
Servers
security risks
scalar product preserving encryption
Resiliency
resilience
query answering
pubcrawl
product preservation property
outsourcing
Metrics
Mathematical model
ASPE
Indexes
Human behavior
encryption
Cryptography
confidential information
Compositionality
Cloud Computing
ciphertexts
asymmetric scalar-product-preserving encryption
Asymmetric Encryption
biblio
A Dynamic Searchable Encryption Scheme for Secure Cloud Server Operation Reserving Multi-Keyword Ranked Search
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Secure
outsourcing
pubcrawl
query processing
ranked search
resilience
Resiliency
resource pooling
search problems
multikeyword
secure cloud server operation
Secure File Sharing
secure technique
sensitive data
Servers
TF × IDF model
update
update operation
dynamic
cloud
Cloud Computing
composability
computational overhead
Cryptography
data owners
data privacy
data users
Amazon EC2 cloud server
dynamic operation
dynamic searchable encryption scheme
encryption
Human behavior
Indexes
Metrics
multi-keyword
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »