Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
TTP
biblio
Comparison among Cooperation, Anonymity and Cloak Area Approaches for Preserving Privacy of IoT
Submitted by grigby1 on Wed, 02/09/2022 - 1:49pm
Peer-to-peer computing
TTP
Smart City
smart cities
security
Resiliency
resilience
pubcrawl
privacy
peer-to-peer security
peer to peer security
Metrics
IoT
Human behavior
data privacy
Cooperation
composability
Cloak area
anonymizer
anonymity
biblio
3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
decentralize identity management system
TTP
trusted third party
three blockchains identity management
telecommunication security
self-generated identity
self-generated certificates
Scalability
Resiliency
public key cryptography
pubcrawl
Metrics
internet
elliptic curves cryptography
Elliptic curve cryptography
Identity management
Cybersecurity
Cryptographic Protocols
computer network security
computer network management
certificate authority
Blockchains Identity Management
blockchain technology
blockchain
autonomous network
authorisation
authentication server
Authentication Protocols
3BI-ECC
profile
Anita Nicholich
SaTC
cyber security
cyberinfrastructure
TTP
cryptocurrency
Illinois
biblio
Secure Digital Service Payments using Zero Knowledge Proof in Distributed Network
Submitted by aekwall on Mon, 01/20/2020 - 11:12am
trustless network
Hash functions
initial trust setup phase
interactive zero knowledge proof
post quantum attacks
PoW
secure digital service payments
SHA3-finalists
tokenized assets
trusted third party
financial transactions
TTP
Witness Indistinguishability
Zcash
zero knowledge proof
zero knowledge proof method
ZKSNARK
ZKSTARK
zero trust
cryptocurrencies
Scalability
data confidentiality
Cryptographic Protocols
Resiliency
pubcrawl
policy-based governance
bitcoin
blockchain
security of data
smart contracts
multiparty computation
Proof-of-work
distributed network
Human Factors
blockchain ecosystem
enterprise applications
fair exchange
biblio
PMDA: Privacy-Preserving Multi-Functional Data Aggregation Without TTP in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 2:16pm
privacy leakage
TTP
trusted third party
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
Smart Grid
Security analysis
security
pubcrawl
privacy-preserving multifunctional data aggregation
privacy-preserving aggregation
privacy protection
privacy preserving
composability
privacy flaws
privacy
power engineering computing
PMDA
multifunctional aggregation
Multi-functional computation
Metrics
Meters
Human behavior
energy management
electricity readings
data privacy
data aggregation
Cryptography
biblio
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
Homomorphic encryption
user privacy data protection
TTP
trusted third party
semantic security
secure multiparty computation
Resiliency
public key cryptography
public environments
pubcrawl
privacy protection
plain text attack
Metrics
homomorphic encryption scheme
Cloud Computing
GPS data of the earthquake
GPS data
encryption
encrypted outsourcing data
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Data Security
data privacy
compute complexity
composability
Cloud Security
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization