Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key encryption
biblio
New Efficient QERPKC based on Partial Discrete Logarithm Problem
Submitted by aekwall on Mon, 03/22/2021 - 12:15pm
Elliptic curve cryptography
quadratic exponentiation randomized public key cryptosystem
QERPKC
QER
PDLP hardness
PDLP
partial discrete logarithm problem
exponentiation
PKC
Transmitters
public key encryption
Safety
Security analysis
computational complexity
public key cryptography
Cryptography
pubcrawl
Resiliency
Protocols
security
encryption
Scalability
biblio
Research and Implementation on an Efficient Public Key Encryption Algorithm with Keyword Search Scheme
Submitted by aekwall on Mon, 02/15/2021 - 3:48pm
Public key
third-party server
third-party data
storage management
Servers
secret retrieval
searchable encryption algorithms
searchable encryption
Resiliency
query formulation
Public key Encryption with Keyword Search (PEKS)
public key encryption algorithm
public key encryption
public key cryptography
Cloud Computing
pubcrawl
NPEKS
network storage service
keyword search scheme
Keyword search
encryption
encrypted data
efficient encryption
data privacy
data confidentiality
cyber physical systems
corporate cloud storage environment
composability
biblio
Detection of Blind Signature Using Recursive Sum
Submitted by aekwall on Mon, 02/08/2021 - 12:45pm
digital signature
recursive sum
digital signature signing process
digital signature security
digital messages
data origin authentication
blinded version
blind source separation
blind signature detection
blind signature
Scalability
RSA
public key encryption
Elliptic curve cryptography
public key cryptography
digital signatures
pubcrawl
Resiliency
private key cryptography
encryption
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 10:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Proxy Re-Encryption using MLBC (Modified Lattice Based Cryptography)
Submitted by grigby1 on Fri, 06/26/2020 - 11:43am
encrypted message
efficient encryption
secure proxy re-encryption
Re-encryption time
public key encryption
Proxy re-encryption
proxy key generation time
Modified Lattice Based Cryptography
MLBC
minimal trust proxy
maximum key privacy
Cryptography
efficient proxy re-encryption
cyber-physical systems
resilience
Resiliency
composability
pubcrawl
public key cryptography
data privacy
security
biblio
The improvement of wireless LAN security authentication mechanism based on Kerberos
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
request message
Metrics
OPNET simulation
password
Protocols
pubcrawl
public key cryptography
public key encryption
replay attacks
message serial number
Resiliency
retransmission message
Servers
transfer message
vulnerable password guessing attacks
wireless LAN
wireless LAN security authentication mechanism
EAP-TLS authentication protocol
asymmetric key encryption method
authentication
authentication server
computer network security
Cryptographic Protocols
Cryptography
dictionary attacks
EAP
802.1X / EAP authentication protocol
Human behavior
KEAP protocol
Kerberos
Kerberos extensible authentication protocol
Kerberos protocol authentication
man-in-the-middle attack
message sequence number
biblio
On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures
Submitted by grigby1 on Wed, 05/30/2018 - 3:02pm
collaboration
digital signatures
Human behavior
Human Factors
Metrics
policy-based governance
pubcrawl
public key encryption
related randomness attacks
resilience
Resiliency
RSA-OAEP
RSA-PSS
security weaknesses
weak randomness
biblio
Universally Composable RFID Mutual Authentication
Submitted by grigby1 on Wed, 05/30/2018 - 2:55pm
security notion
public key update protocols
radiofrequency identification
readers corruptions
Resiliency
RFID Authentication
RFID mutual authentication protocols
RFID tags
Scalability
public key infrastructure
tags corruptions
trusted certificates
trusted cryptographic protocols
trusted third parties
universal composability
universally composable framework
zero-knowledge privacy model
adversary model
public key encryption
public key cryptography
Public key
pubcrawl
Protocols
privacy
PKI Trust Models
Metrics
message authentication code
Human Factors
Human behavior
Cryptographic Protocols
cryptographic protocol
authentication
arbitrary environment
biblio
Fully homomorphic encryption schemes: The state of the art
Submitted by grigby1 on Wed, 02/21/2018 - 12:44pm
Lattices
stored data confidentiality
storage management
Sorting
Scalability
Resiliency
resilience
remote database
public key encryption
pubcrawl
processed data confidentiality
Policy-Governed Secure Collaboration
Policy
noise reduction
multibit FHE scheme
Metrics
bootstrapping
human factor
Human behavior
homomorphic encryption schemes
homomorphic cryptosystems
fully homomorphic encryption
encryption
Databases
database management systems
Cryptology ePrint Archive
cryptology
Cryptography
composability
collaboration
Cloud Computing
biblio
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption
Submitted by K_Hooper on Wed, 10/04/2017 - 9:54am
Adversary Models
chosen-ciphertext attack
complete non-malleability
Human behavior
pubcrawl
public key encryption
Resiliency
scalabilty
standard model
1
2
next ›
last »