Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
trusted authority
biblio
An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
Submitted by grigby1 on Fri, 07/29/2022 - 9:04am
Smart Grid
power grid vulnerability analysis
session key
trusted authority
key agreement
secure communication
Metrics
Smart Grids
Wireless communication
smart meters
tools
Protocols
authentication
Scalability
Resiliency
resilience
pubcrawl
security
privacy
biblio
Decentralized Identity and Trust Management Framework for Internet of Things
Submitted by grigby1 on Mon, 03/29/2021 - 2:25pm
IOTA Tangle
web of trust approach
Trusted Computing
trusted authority
Trust Management Framework
Trust framework
sensors
self sovereign identity
self sovereign identities
Scalability
Resiliency
resilience
quantifiable trust
pubcrawl
proprietary environments
permissionless environment
web of trust
IoT devices
Internet of Things devices
Internet of Things
IDMS
identity management system
Identity management
Human behavior
enclosed environments
DLT's network
Distributed Ledger Technology
Distributed databases
decentralized Identity
automatic trust rating
authorisation
arbitrary identities
biblio
Policy-based Revolutionary Ciphertext-policy Attributes-based Encryption
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
TA
Trusted authority (TA)
revocation
policy-based revolutionary ciphertext-policy attribute-based encryption scheme
policy revocation
policy identity number
PHR testing
Personal Health Records (PHRs)
personal health record testing
flexible updating policy control
cryptographic mechanism
Ciphertext-policy Attributes-based Encryption (CP-ABE)
CP-ABE scheme
Cloud Computing
Systems architecture
trusted authority
hospitals
policy-based governance
pubcrawl
Human behavior
private key cryptography
attribute-based encryption
encryption
Servers
Scalability
biblio
SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query results for Cloud Databases
Submitted by aekwall on Mon, 11/25/2019 - 2:11pm
metadata
Outsourced Database Integrity
trusted authority
secure scheme to provide confidentiality and integrity of query
SCIQ-CD
database service providers
database queries
database outsourcing
Database as a service
data confidentiality
cloud databases
outsourcing
data integrity
database management systems
Cloud Computing
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
Trusted Computing
cloud storage
data privacy
encryption
Cryptography
authorisation
biblio
Establishing Trust by Detecting Malicious Nodes in Delay Tolerant Network
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
selfish behavior
Probabilistic logic
probabilistic misbehavior detection scheme
probability
pubcrawl
Punishment
Resiliency
Routing
Scalability
probabilistic checking
Selfish node
Task Analysis
telecommunication network routing
telecommunication security
trust
Trust Routing
trusted authority
Trusted Computing
game theory analysis
compensation
composability
Conferences
delay tolerant network
delay tolerant networks
DTN
dynamic probabilistic inspection
game theory
Ad hoc networks
History
Inspection
malicious nodes
Market research
MAXTRUST scheme
Misbehavior detection
misbehavior nodes
mobile radio
biblio
An Efficient Privacy Preserving Cryptographic Approach in Cloud Computing
Submitted by grigby1 on Thu, 01/31/2019 - 12:23pm
attribute encryption
cloud
Cloud Computing
cloud proxy server
data storage
encryption audits
Metrics
privacy preserving
pubcrawl
public auditing
resilience
Resiliency
Scalability
trusted authority
user privacy
user privacy in the cloud
biblio
Pseudonym-Based Cryptography and Its Application in Vehicular Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:49pm
provable secure pseudonym-based cryptosystems
vehicular ad-hoc networks
vehicular ad hoc networks
vehicles
VANET
trusted authority
pseudonym-based signature scheme
pseudonym-based multi-receiver encryption scheme
pseudonym-based key establishment protocol
cooperative caching
Protocols
privacy
onion packet
encryption
data access scheme
Cryptographic Protocols
cooperative caching technology