Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data confidentiality
biblio
Lightweight Dynamic Key-Dependent and Flexible Cipher Scheme for IoT Devices
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
Internet of Things systems
symmetric-key algorithm
simple round function
security attacks
security and performance analysis
Scalability
Resiliency
Radio frequency
pubcrawl
plaintext messages
Lightweight flexible key dependent cipher scheme
lightweight cryptographic algorithms
Lightweight Ciphers
lightweight cipher scheme
IoT systems
IoT devices
cipher variants
Internet of Things
input message
Heuristic algorithms
flexible lightweight cipher
flexible cipher scheme
dynamic Operation mode
dynamic key approach
dynamic cryptographic primitives
data confidentiality
Cryptography
confidentiality attacks
Conferences
computer network security
Ciphers
biblio
Polynomial-based Lightweight Key Management in a Permissioned Blockchain
Submitted by aekwall on Mon, 01/20/2020 - 11:49am
polynomial
transaction confidentiality
telecommunication security
system scalability
security
Scalability
Resiliency
public-key schemes
public-key operations
public-key infrastructure
public key cryptography
pubcrawl
polynomials
polynomial-based schemes
128-bit modulus size
PKI
permissioned blockchain platform
lightweight polynomial-based key management scheme
identity authentication
exponentiation
expensive modular exponentiation operations
data confidentiality
Cryptography
cryptocurrencies
computationally less intensive polynomial evaluation operations
blockchain applications
blockchain
2048-bit RSA
biblio
SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query results for Cloud Databases
Submitted by aekwall on Mon, 11/25/2019 - 2:11pm
metadata
Outsourced Database Integrity
trusted authority
secure scheme to provide confidentiality and integrity of query
SCIQ-CD
database service providers
database queries
database outsourcing
Database as a service
data confidentiality
cloud databases
outsourcing
data integrity
database management systems
Cloud Computing
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
Trusted Computing
cloud storage
data privacy
encryption
Cryptography
authorisation
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Resiliency
multiprocessing systems
parallel database encryption system
parallel databases
Performance
performance evaluation
pubcrawl
RDBMS
relational database security
relational databases
Multicore processing
Scalability
smart phones
SQLite databases
SQLite RDBMS
SQLite-XTS
storage management
storage security
user sensitive data
XTS encryption
full disk encryption
composability
Cryptography
data confidentiality
Data protection
Databases
device processing resources
embedded devices
embedded systems
encryption
commodity multicore processors
handheld devices
Human behavior
light database encryption design
massive storage systems
Metrics
mobile computing
mobile devices
multicore CPU
multicore computing security
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
source nonrepudiation
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
malicious viruses
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
authentication
live VM migration
live migration
Human behavior
enhanced secure mechanism
DDoS Attacks
data integrity
data confidentiality
computer viruses
Computational modeling
composability
Cloud federations
Cloud Computing
AVISPA tool
authorization
authorisation
biblio
Ensuring Cloud Data Security Using Public Auditing with Privacy Preserving
Submitted by grigby1 on Mon, 08/05/2019 - 11:30am
encryption audits
windows server instance
third party auditor
storage management
Servers
security issues
secure hash algorithm
secure auditing system
Resiliency
resilience
public auditing
pubcrawl
privacy preserving
Metrics
metadata
advanced encryption standard algorithm
encryption
data storing
data privacy
data integrity
data confidentiality
Cryptography
Compositionality
cloud service providers
cloud data security
cloud data
Cloud Computing
auditing
Amazon EC2 cloud
biblio
IDS Based Network Security Architecture with TCP/IP Parameters Using Machine Learning
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
security actions
networks
normal threats data sets
pattern classification
privacy
Protocols
pubcrawl
regular traffic pattern
Reinforcement algorithm
Reliability
resilience
Resiliency
securities threats
security
Network Security Architecture
security devices
security of data
security problems
server based access
TCP-IP packets
TCP-IP parameters
TCP/IP Protocols
TCPIP
telecommunication traffic
transport protocols
vulnerable sites
WEKA and Snoor tools
data confidentiality
authentication
authorisation
Classification algorithms
Communication networks
composability
computer access
computer architecture
computer network security
computer security
Confidentiality and Vulnerabilities
crypto algorithms
Cryptography
authentic data
data reliability
data set
internet
Intrusion Detection
IoT (Internet of Things)
IP networks
IPsec
KNN classification
kNN classification algorithm
learning (artificial intelligence)
machine learning
network access
biblio
Vulnerability Analysis of Content Management Systems to SQL Injection Using SQLMAP
Submitted by aekwall on Mon, 02/25/2019 - 11:39am
tools
program testing
pubcrawl
Resiliency
security vulnerability
SQL
SQL injection
SQLI
SQLi vulnerabilities
SQLMAP
privacy
Vulnerability
Vulnerability Analysis
vulnerability scanner
Web application
web applications
Web sites
websites
WordPress
Drupal website pages
Computer hacking
content management
content management systems
Cybersecurity
data confidentiality
data integrity
Data protection
Databases
Computer crime
Human behavior
internet
Joomla website pages
LAMP server
Metrics
Nikto
Penetration Testing
policy-based-governance
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
biblio
Ideal complexity cryptosystem with high privacy data service for cloud databases
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Databases
storage services
secrecy
Scalability
Safety
Resiliency
resilience
pubcrawl
privacy
metadata
human factor
Human behavior
high privacy data service
encryption techniques
encryption
client data
database management systems
Database as a service
data storage
data privacy
data confidentiality
cryptosystem
Cryptography
Concurrency
Computing Theory
Complexity theory
Cloudcomputing
cloud service provider
cloud databases
Cloud Computing
« first
‹ previous
1
2
3
4
5
next ›
last »