Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
document handling
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
Software Development of Electronic Digital Signature Generation at Institution Electronic Document Circulation
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
Consumer electronics
Web-interface
software tools
secure key storage
institution electronic document circulation
GOST RF Standard 34.10–2018
electronic document circulation
electronic digital signature generation
documented information exchanging
cryptographic module
central Web-server
blockchain storage of electronic signatures
blockchain storage
ECDSA
Scalability
electronic digital signature
DSA
document handling
RSA
Information systems
digital signatures
software development
software engineering
blockchain
pubcrawl
Resiliency
Software
Cryptography
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
biblio
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Submitted by grigby1 on Tue, 01/07/2020 - 9:55am
repeated encryption
multiuser searchable encryption scheme
outsourced encrypted data
outsourcing
PS
pubcrawl
Public key
query processing
query transformation
multiple owners
resilience
Resiliency
SE schemes
search operation
secure proxy server approach
Servers
user queries
cyber physical systems
attribute-based encryption
authorisation
Broadcast Encryption
Cloud Computing
cloud data
composability
Cryptography
Cyber Physical System
abe
data privacy
document handling
efficient encryption
encryption
Euclidean distance
existing SE approaches
Indexes
biblio
Efficient Exploration of Algorithm in Scholarly Big Data Document
Submitted by aekwall on Wed, 09/04/2019 - 10:16am
document handling
Metadata Discovery Problem
TFIDF
textual content
Steaming
Software algorithms
Sentence Extractor
self-learning
searching algorithms
search engine
scholarly digital documents
scholarly Big Data document
Scholarly big data
Pseudo codes
Portable document format
indexing
Scalability
AlgorithmSeer
Algorithms
algorithm representations
algorithm indexing
algorithm database
search engines
Data mining
metadata
internet
composability
pubcrawl
Resiliency
learning (artificial intelligence)
machine learning algorithms
Big Data
biblio
Automated Threat Report Classification over Multi-Source Data
Submitted by grigby1 on Mon, 01/21/2019 - 11:37am
multisource data
Training
threat report documents
Threat report
Standards organizations
security of data
security
Scalability
Resiliency
pubcrawl
pattern classification
Organizations
NLP
natural language processing techniques
natural language processing
advanced persistent threats
Metrics
machine learning model
learning (artificial intelligence)
Human behavior
feature extraction
enterprise system defenders
document handling
defense systems
Data mining
command and control systems
collaboration
business data processing
bias correction
automated threat report classification
biblio
Enhancing Breeder Document Long-Term Security Using Blockchain Technology
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Ecosystems
travel industry
statu nascendi
security of data
security
Scalability
Resiliency
pubcrawl
Iris recognition
Image coding
Identity management
Human behavior
electronic travel documents
electronic commerce
bitcoin security
e-passports
document handling
Cryptography
content harmonisation
breeder document standardisation
breeder document long-term security enhancement
breeder document
blockchain
Bitcoin blockchain
bitcoin
birth certificates
birth certificate
biometrics
biblio
Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage
Submitted by grigby1 on Tue, 02/06/2018 - 12:58pm
encryption
trustworthy access control
trusted platform modules
Trusted Computing
storage management
semantically rich access control system
robust access control
Resiliency
pubcrawl
OWL
Organizations
organization confidentiality policies
Ontologies
Oblivious Storage
end-to-end oblivious data transaction
Access Broker
document security
document handling
data threats
Confidentiality Policy
Computational modeling
composability
cloud storage security
cloud service platform
Cloud Computing
business data processing
authorisation
Access Control
access broker module
biblio
Shellcode detector for malicious document hunting
Submitted by grigby1 on Wed, 12/20/2017 - 12:08pm
malicious documents
Web sites
Web site
tools
simple encryption method
shellcode detector
shellcode
pubcrawl
Portable document format
Phishing
open-source tools
object retrieval
network threat
malware
advanced persistent threat attacks
malicious document hunting
malicious document detector
information retrieval
Human Factors
Human behavior
feature extraction
encryption
Electronic mail
document handling
Detectors
Computer crime
APT attack techniques
advanced persistent threats
1
2
next ›
last »