Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public-key encryption
biblio
A New LWE-based Homomorphic Encryption Algorithm over Integer
Submitted by grigby1 on Fri, 05/20/2022 - 3:32pm
pubcrawl
Additives
composability
Artificial Intelligence
Compositionality
public key cryptography
information science
Transforms
Homomorphic encryption
LWE
Post-quantum cryptography
public-key encryption
theoretical cryptography
biblio
Degree-sequence Homomorphisms For Homomorphic Encryption Of Information
Submitted by aekwall on Mon, 01/10/2022 - 11:46am
Lattices
Compositionality
Resiliency
topological coding
public-key encryption
Homomorphic encryption
graph homomorphism
asymmetric encryption algorithm
Asymmetric Encryption
Controllability
automation
encoding
Human behavior
Metrics
pubcrawl
Public key
Conferences
biblio
An Information Theoretic Approach to Assist in Identifying Counterfeit Consumer Goods
Submitted by grigby1 on Mon, 01/10/2022 - 11:16am
pubcrawl
Township Community
tools
Spaza-Shop
Scalability
RSA private-key decryption
Resiliency
resilience
QR code
public-key encryption
Public key
android
Prediction algorithms
Metrics
information sharing
Human behavior
encryption
Databases
codes
Cloud Storage Database
android encryption
biblio
A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:06pm
Predictive Metrics
SHA-512 algorithm
secure public auditing scheme
secure data dynamics
RSA-15360 algorithm
data dynamics operation
AES-256 algorithm
public-key encryption
cloud service providers
auditing
encryption audits
data storage
Compositionality
Cloud Computing
storage management
public key cryptography
Public key
pubcrawl
Resiliency
security
data integrity
data privacy
data owner
cloud storage
Servers
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
High-Performance and Lightweight Lattice-Based Public-Key Encryption
Submitted by grigby1 on Fri, 10/27/2017 - 11:19am
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
atxmega
cortex-m0
ideal lattices
Learning with errors
public-key encryption
Asymmetric Encryption
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 10:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization