Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational complexity
biblio
On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems
Submitted by grigby1 on Mon, 10/05/2020 - 2:10pm
provably-correct distributed state estimation algorithm
trusted nodes
Trusted Computing
state estimation
set theory
sensors
security
Scalability
Robustness
resilient distributed state estimation
Resiliency
resilience
Redundancy
pubcrawl
attack-prone environment
NP-hard
Measurement
LTI systems
Linear systems
linear dynamical process
Human Factors
Heuristic algorithms
computer theory
computer network security
computational complexity
communication-link augmentation
attack-resilient algorithm
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Submitted by grigby1 on Fri, 09/04/2020 - 4:16pm
full black-box security
user private key
user privacy security
user identity
user decryption
underlying TB-IBE scheme
token-based identity-based encryption
Resiliency
resilience
pubcrawl
private key cryptography
Metrics
malicious private key generator
Identity-based encryption
generic construction
A-IBE scheme
encryption
dummy identity-based encryption
Decoding
decoder box
data privacy
computational complexity
composability
ciphertexts
black-box security
black box encryption
authority identity-based encryption
authorisation
attribute-based encryption
Accountable authority
biblio
CPSS: CP-ABE based Platoon Secure Sensing Scheme against Cyber-Attacks
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Safety
malicious attacks
platoon key
platoon maneuvers
platoon secure sensing scheme
platoon stability
policy-based governance
polynomial time solution
position information
Public key
LTE-V2X
Scalability
security insurance
sensing data
sensors
Stability analysis
traffic efficiency
traffic engineering computing
Veins platform
Cryptography
Access Control
access control structure
authorisation
Cloud Computing
collaboration
computational complexity
CP-ABE
CP-ABE based platoon
CPSS
pubcrawl
cyber-attacks
cyphertext-policy attribute-based encryption
distance fluctuations
driving applications
encryption
Gold
key distribution process
life-threatening accidents
biblio
Protect white-box AES to resist table composition attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:54am
cryptographic software protection
white box cryptography
white-box cryptography
white-box attack context
white-box AES protection
WBAC
Time complexity
table-composition-targeting white-box attacks
table-composition-targeting cryptanalysis techniques
key-embedding lookup tables
key recovery attacks
De Mulder et al.'s attack
Resiliency
Billet et al.'s attack
affine mappings
Table lookup
Secret key
computational complexity
public key cryptography
Data protection
Metrics
composability
pubcrawl
biblio
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
box times
white box cryptography
white-box Ramsey problem
white-box model
white-box hardness
white-box complexity
the Ramsey problem
TFNP problems
succinct black-box
Ramsey theory
hard property
graph size
graph property testing
description size
collision-resistant hashing
Resiliency
black-box hardness
black-box complexity
search problems
Resistance
Integrated circuit modeling
pubcrawl
Complexity theory
computational complexity
testing
Metrics
Computational modeling
Cryptography
graph theory
composability
biblio
Deletion Propagation for Multiple Key Preserving Conjunctive Queries: Approximations and Complexity
Submitted by grigby1 on Fri, 07/10/2020 - 11:41am
query processing
multiple project-free
multiple queries
nontrivial set
polynomials
privacy
problem funda-mental
pubcrawl
quality management
query feedback
multiple key preserving conjunctive queries
realistic case
repairing data
Scalability
single query case
standard deletion propagation problem
tuples
view propagation
view side-effect
data lineage
Approximation algorithms
approximations
Complexity theory
computational complexity
computer science
conjunctive queries
conjunctive query
data cleaning
data deletion
approximation
Databases
debugging
deletion propagation
dichotomy
dynamic programming
Heuristic algorithms
investigated problem
key preserving
biblio
Reasoning about Sequential Cyberattacks
Submitted by aekwall on Mon, 07/06/2020 - 10:15am
Human Factors
Cyber Dependencies
vulnerability dependencies
simulated vulnerability data
sequential cyberattacks
sequential chained attacks
NP-complete problem
fixed-point operator
cyber-attack modeling
cyber-adversary
cyber adversaries
Cost function
adversarial reasoning
computer systems
Compositionality
Scalability
cognition
Complexity theory
computational complexity
Lattices
Mathematical model
optimisation
Cybersecurity
Metrics
Computational modeling
Social network services
pubcrawl
Resiliency
invasive software
biblio
Efficient Implementation of Cryptography on Points of an Elliptic Curve in Residue Number System
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Metrics
weighted number system
Scalability
RNS
Resiliency
resilience
residue number systems
residue number system
public key cryptography
pubcrawl
Modular Multiplication
adding points
Mathematical model
Jacobian matrices
Galois fields
Elliptic curves
Elliptic curve cryptography
elliptic curve
doubling points
Cryptography
computational complexity
arithmetic operations
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 11:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »