Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data confidentiality
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
Establishing a Zero Trust Strategy in Cloud Computing Environment
Submitted by grigby1 on Thu, 03/04/2021 - 3:04pm
cloud computing environment
zero trust
Zero Trust Strategy
Trust Management System
trust management mechanisms
Subjective Trust
static trust relationship
Objective Trust
Incipient Technology
conceptual zero trust strategy
Data Breach
cloud service providers
Trusted Computing
Cloud Computing
Scalability
data integrity
data privacy
data confidentiality
Resiliency
resilience
policy-based governance
Human Factors
pubcrawl
biblio
Research and Implementation on an Efficient Public Key Encryption Algorithm with Keyword Search Scheme
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
Public key
third-party server
third-party data
storage management
Servers
secret retrieval
searchable encryption algorithms
searchable encryption
Resiliency
query formulation
Public key Encryption with Keyword Search (PEKS)
public key encryption algorithm
public key encryption
public key cryptography
Cloud Computing
pubcrawl
NPEKS
network storage service
keyword search scheme
Keyword search
encryption
encrypted data
efficient encryption
data privacy
data confidentiality
cyber physical systems
corporate cloud storage environment
composability
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
different ECUs
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
improved security
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
Metrics
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
road safety
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
Fuzzy Keyword Sets
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Indexes
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
Cloud Computing
fuzzy set theory
Fuzzy logic
Data protection
query processing
Metrics
pubcrawl
Resiliency
data encryption
encryption
data confidentiality
Cryptography
authorisation
Keyword search
Servers
Scalability
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 11:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Using Attack Pattern for Cyber Attack Attribution
Submitted by grigby1 on Fri, 08/28/2020 - 12:23pm
cyber attribution problem
pubcrawl
Metrics
information system
individual organization
Human behavior
data integrity
data confidentiality
data availability
attack pattern
Cyber Attribution
cyber attack initiator identification
cyber attack
computer network security
composability
attribution
attack scenario
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
wireless sensor networks
technological vision
industrial IoT applications
fABElous
ciphertext-policy attribute-based encryption
broadcast
attribute-based scheme
ABE techniques
ABE scheme
CP-ABE
communication overhead
actuators
Constrained Devices
Intelligent sensors
Scalability
policy-based governance
pubcrawl
Human behavior
embedded devices
data integrity
Internet of Things
attribute-based encryption
abe
encryption
data confidentiality
Cryptography
authorisation
Access Control
biblio
Broker Bridging Mechanism for Providing Anonymity in MQTT
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
message passing
standard mechanisms
smart devices
security service
onion routing
MQTT-SN
MQTT
message exchange
dynamic broker bridging mechanism
Broker Bridging
anonymous communications
MQTT protocol
anonymity
Metrics
encryption
Routing
composability
Databases
Protocols
internet
data integrity
data privacy
data confidentiality
computer network security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
multiauthority CP-ABE scheme
cryptographic applications
cryptographic technology
data confidentiality
flexible threshold access policy
generic lattice
ideal lattice
Multi-authority
multiauthority ciphertext policy
Ciphertext policy attribute-based encryption
multiple attribute authorities
post-quantum era
quantum attacks
R-LWE
ring learning with errors
virtual attributes
collaboration
Cryptography
bilinear maps
fine-grained access control
Resists
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption scheme
CP-ABE
Lattices
policy-based governance
pubcrawl
Cloud Computing
Scalability
data privacy
authorisation
Access Control
encryption
1
2
3
4
5
next ›
last »