Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secret sharing
biblio
Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error
Submitted by grigby1 on Mon, 07/31/2023 - 1:27pm
secret sharing
Fuzzy Cryptography
Image quality
PSNR
data hiding
Satellites
Data protection
Steganography
Fuzzy logic
pubcrawl
network infrastructure
Image edge detection
information security
Communication networks
Scalability
Resiliency
resilience
Metrics
biblio
Efficient Public Verification of Confidential Supply-Chain Transactions
Submitted by grigby1 on Thu, 01/05/2023 - 2:28pm
pubcrawl
resilience
Resiliency
Protocols
Production
network security
secret sharing
Sociology
supply chains
Homomorphic encryption
distributed ledger
Pressing
supply chain security
Distributed Ledger Technology
Proxy re-encryption
supply-chain verification
biblio
Random verifiable multi-server searchable encryption scheme
Submitted by grigby1 on Fri, 04/01/2022 - 1:08pm
Cloud Computing
composability
Data models
data privacy
Distributed databases
encryption
game theory
Games
multi-server
pubcrawl
resilience
Resiliency
result verification
search problems
searchable encryption
secret sharing
biblio
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
IBS
Information Centric Networks
polynomials
user privacy
secret sharing
telecommunication network planning
Identity-based encryption
content distribution
IBE
information-centric networking
IBSS
identity-based secret sharing access control framework
next generation network design
polynomial degree
request-response communication mode
secure identity encryption
Shamir's secret sharing method
pubcrawl
Scalability
Access Control
authorisation
authorization
Cryptography
encryption
data privacy
Resiliency
computer network security
privacy
internet
delays
user identity
Next generation networking
next generation networks
ICN
biblio
Handling concurrent requests in a secret sharing based storage system using Petri Nets
Submitted by grigby1 on Tue, 10/06/2020 - 2:02pm
perfect security
storage system
storage servers
storage management
server failure
security
secret sharing schemes
secret sharing
Resiliency
resilience
pubcrawl
Petri nets
composability
Metrics
distributed computer network
data theft
data storage security
cyber physical systems
Cryptography
CPS
concurrent update requests
concurrent request handling
concurrency (computers)
Concurrency
biblio
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
Submitted by grigby1 on Thu, 08/13/2020 - 5:22pm
revocation overhead
privacy
privacy-preserving authentication
private key cryptography
pseudonymous certificates
pseudonyms
pubcrawl
Public key
resilience
Resiliency
n) threshold secret sharing
Roads
Scalability
secret sharing
Shamir (t
telecommunication security
VANET
vehicular ad hoc networks
vehicular communications
DCS schemes
anonymous messaging
authentication
authentication overhead
authorisation
backward security
certificate revocation list
certificate updating overhead
CPPT
data privacy
anonymous communications
ECPP scheme
EMAP scheme
forward security
framed attacks
hash chain
hash chains
hybrid scheme
message authentication
biblio
Secret Sharing Based SM2 Digital Signature Generation using Homomorphic Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
ECC
State Cryptography Administration
SM2 signature generation schemes
SM2 digital signature generation
SM2
secure cloud cryptography computing
secret sharing based cryptography
key exchange schemes
elliptic curve public key cryptography algorithm
additively homomorphic encryption
China
secret sharing
Homomorphic encryption
Cloud Computing
Elliptic curves
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
Software
data encryption
encryption
digital signature
Scalability
biblio
Distributed and Private Coded Matrix Computation with Flexible Communication Load
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
master server
matrix multiplication
Metrics
multiple workers
nonsecure versions
policy-based governance
private coded matrix computation
pubcrawl
recovery threshold
learning (artificial intelligence)
Resiliency
Scalability
secret sharing
secure generalized PolyDot codes
security
security constraint
Servers
telecommunication security
tensor operations
encoding
colluding workers
computational delay
convolution
data privacy
delays
distributed computing platform
Distributed databases
distributed learning
distributed platforms
Coded distributed computation
flexible communication load
flexible trade-off
Human behavior
Human Factors
information theoretic security
information theoretic security.
input data matrices
large-scale machine learning applications
biblio
Searchable Encryption Using Secret-Sharing Scheme for Multiple Keyword Search Using Conjunctive and Disjunctive Searching
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
index search
resilience
Resiliency
composability
pubcrawl
secret-sharing scheme
secret sharing
Secrecy Computation
Search methods
multiple keyword search
main searching functions
logical disjunctive
logical conjunctive
Cryptography
disjunctive searching
direct searching
conjunctive searching
computation cost
search problems
searchable encryption
Cloud Computing
Servers
query processing
Public key
Indexes
encryption
biblio
FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table
Submitted by aekwall on Mon, 12/16/2019 - 1:46pm
Indexes
threshold cryptography
system reliability
Servers
secret sharing
resilience
pubcrawl
privacy protection
privacy
Mathematical model
life cycle
internet
Instant messaging
data deletion
Human behavior
hash collision
frequent colliding hash table
FlashGhost
data self destructing
Data Sanitization
data privacy
Cryptography
computer network security
computer network reliability
Compositionality
automatic data sanitization system
1
2
3
4
next ›
last »