Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message encryption
biblio
Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
KP-ABE
threshold grouping-proofs
Security analysis
Scalability
RFID systems
radiofrequency identification
Public key
pubcrawl
policy-based governance
Pairing Cryptography
message encryption
KP-ABE protocol
Access Control
key-policy attribute-based encryption
key policy attribute based encryption
IoT applications
Internet of Things
grouping-proofs based access control
Grouping proofs
encryption
Cryptographic Protocols
collaboration
authorize NFC payment
authorisation
biblio
Security of Cloud Intelligent Robot Based on RSA Algorithm and Digital Signature
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
message exchange
Service robots
service robot
security
Scalability
RSA algorithm
Resiliency
public key cryptography
Public key
pubcrawl
message transmission
message integrity
cloud
message encryption
message decryption
message authentication
intelligent robots
encryption
digital signatures
digital signature algorithm
digital signature
control engineering computing
cloud intelligent robot
Cloud Computing
biblio
An Efficient CPA-Secure Encryption Scheme with Equality Test
Submitted by grigby1 on Fri, 09/28/2018 - 3:20pm
multiplicative homomorphism
zero knowledge proof
Resiliency
resilience
public key solutions
public key cryptography
Public key
pubcrawl
Protocols
Probabilistic logic
OW-CPA security
outsourcing
noninteractive zero knowledge proof of discrete log
comparable ciphertext
message encryption
IND-CPA security
Homomorphic encryption
equality test token
encryption scheme with equality test
encryption
ElGamal encryption
efficient encryption
efficient CPA-secure encryption scheme
data outsourcing scenario
cyber physical systems
composability
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization