Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user identity
biblio
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 3:29pm
IBS
Information Centric Networks
polynomials
user privacy
secret sharing
telecommunication network planning
Identity-based encryption
content distribution
IBE
information-centric networking
IBSS
identity-based secret sharing access control framework
next generation network design
polynomial degree
request-response communication mode
secure identity encryption
Shamir's secret sharing method
pubcrawl
Scalability
Access Control
authorisation
authorization
Cryptography
encryption
data privacy
Resiliency
computer network security
privacy
internet
delays
user identity
Next generation networking
next generation networks
ICN
biblio
Security Issues Seclusion in Bitcoin System
Submitted by grigby1 on Tue, 03/09/2021 - 1:49pm
Human behavior
User profile
user identity
transaction verification
transaction processing
transaction management
trading
security issues
security
Scalability
pubcrawl
pseudonames
peer-to-peer payment network
Peer-to-peer computing
market
adversarial attacks
exchange trading commodity
exchange
digital currency
data privacy
cryptocurrency
cryptocurrencies
crypto-currency
blockchain
Bitcoin system
Bitcoin privacy
bitcoin
assets
Anonymity and Privacy
biblio
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
full black-box security
user private key
user privacy security
user identity
user decryption
underlying TB-IBE scheme
token-based identity-based encryption
Resiliency
resilience
pubcrawl
private key cryptography
Metrics
malicious private key generator
Identity-based encryption
generic construction
A-IBE scheme
encryption
dummy identity-based encryption
Decoding
decoder box
data privacy
computational complexity
composability
ciphertexts
black-box security
black box encryption
authority identity-based encryption
authorisation
attribute-based encryption
Accountable authority
biblio
TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
security
Human behavior
Kerberos
Kerberos biometric blowfish user authentication
message authentication
Metrics
pubcrawl
Registration
Resiliency
secured data access
genuine user
Servers
Ticket Granting
tiger hash
Tiger Hash-based Kerberos biometric blowfish authentication
unauthorized users
user ID
user identity
users ID
cloud server
authenticated user
authentication
authentication accuracy
authentication server
authentications time
authenticity
authorisation
Blowfish encryption
Cloud Computing
Access Control
cloud services
cloud user
confidentiality rate
Cryptography
CS grants
CU
encrypted ticket
encryption
biblio
Securing user identity and transactions symbiotically: IoT meets blockchain
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
permissioned blockchain
user identity
transactions symbiotically
standards
security of data
security
Scalability
Robustness
Resiliency
Public key
pubcrawl
Protocols
privacy
Permissioned Blockchains
attribute management
performance evaluation
IoT
Internet of Things
Identity management
Human behavior
History
embedded devices
Distributed Identity Management
device identity
data privacy
Cryptography
blockchain technology
blockchain
biblio
A User Centric Identity Management for Internet of Things
Submitted by BrandonB on Tue, 05/05/2015 - 7:42am
authentication
authorisation
authorization
device authentication
device identity
identity management systems
IDM system
Internet of Things
Medical services
Mobile handsets
user centric identity management
user identity