Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Asymmetric Encryption
biblio
(Deterministic) Hierarchical Identity-based Encryption from Learning with Rounding over Small Modulus
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
(hierarchical) identity-based encryption
deterministic (hierarchical) identity-based encryption
learning with rounding
Asymmetric Encryption
biblio
Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing Among Cryptographic Clouds
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Asymmetric Encryption
Compositionality
Human behavior
hybrid proxy re-encryption
Metrics
Proxy re-encryption
pubcrawl
Resiliency
secure cloud storage
biblio
Segmented Crypto Algorithm
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
asymmetric key cryptography
Bit wise shifting
cryptosystem
decryption
encryption
folding logic
Symmetric Key Cryptography
Asymmetric Encryption
biblio
Content-based Security for the Web
Submitted by grigby1 on Mon, 09/11/2017 - 2:18pm
Asymmetric Encryption
Browser Security
content-based security
end-to-end encryption
Human behavior
pubcrawl
Resiliency
Scalability
web security
biblio
Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation
Submitted by grigby1 on Tue, 09/05/2017 - 1:48pm
Asymmetric Encryption
attribute based encryption
Cloud Security
Human behavior
key aggregation cryptosystem
pubcrawl
Resiliency
Scalability
security and privacy
Security Heuristics
sensor network
sensor security
biblio
CoKey: Fast Token-based Cooperative Cryptography
Submitted by grigby1 on Tue, 05/30/2017 - 12:45pm
linux operating systems security
full disk encryption
data confidentiality
cryptographic token
cooperative cryptography
composability
Asymmetric Encryption
Metrics
pubcrawl
Resiliency
USB armory
USB token
biblio
Generic Construction of Publicly Verifiable Predicate Encryption
Submitted by grigby1 on Mon, 05/22/2017 - 1:55pm
Asymmetric Encryption
cloud computation
composability
Metrics
predicate encryption
pubcrawl
publicly verifiable computation
quantum computing security
Resiliency
biblio
Identity-Concealed Authenticated Encryption and Key Exchange
Submitted by grigby1 on Wed, 03/29/2017 - 12:39pm
Asymmetric Encryption
authenticated encryption
composability
Key exchange
Metrics
pubcrawl
Resiliency
white box
white box cryptography
biblio
Design of a cyber security framework for ADS-B based surveillance systems
Submitted by BrandonB on Tue, 05/05/2015 - 12:08pm
digital communications
United States airspace
United State airspace
surveillance
space-based automatic dependent surveillance-broadcast
security of data
secure transmission framework design
real-time flight data
radar coverage
Radar
hashing
ground stations
FAA
encryption
economic implications
ADS-B based surveillance systems
digital communication
cyber security framework design
Cryptography
collision risk
Atmospheric modeling
Asymmetric Encryption
ARTCC
Aircraft
air traffic controllers
air traffic control
air route traffic control center
ADS-B surveillance systems
ADS-B signals
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
« first
‹ previous
1
2
3
4
5
6
7