Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
central authority
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
central authority
collaboration
user collusion avoidance
Resists
privacy-preserving decentralized KP-ABE
key policy
decisional bilinear Diffie-Hellman assumption
decentralized KP-ABE scheme
decentralized KP ABE scheme
decentralized key policy ABE schemes
Decentralized attribute-based encryption
DBDH assumption
collusion attack
encryption
attributed-based encryption
KP-ABE
key policy attribute based encryption
policy-based governance
pubcrawl
public key cryptography
Generators
privacy
Scalability
Public key
data privacy
authorisation
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Mobile ad hoc networks (MANETs)
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Blackhole attack
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
network nodes
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
Scalability
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
biblio
Protecting vehicular networks privacy in the presence of a single adversarial authority
Submitted by grigby1 on Mon, 06/11/2018 - 2:39pm
Resiliency
vehicular networks privacy protection
vehicular ad hoc networks
vehicular ad hoc network
traffic-simulator based experiments
traffic engineering computing
threshold-based detection
telecommunication security
single insider adversary
single adversarial authority
Security Credential Management System
security
SCMS design
road vehicles
road traffic
central authority
resilience
relabeling
pubcrawl
privacy information leakage
privacy
principal component analysis
network accountability
Metrics
key management
data privacy
Couplings
Conferences
composability
Communication networks
biblio
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm
Submitted by grigby1 on Wed, 05/30/2018 - 3:04pm
input addresses
signature based defense
Servers
Scalability
ring signature algorithm
ring signature
Resiliency
resilience
Public key
pubcrawl
Protocols
perceived anonymity property
output addresses
mixing service provider
mixing server
anonymity
financial data processing
electronic money
double-spending attack
digital signatures
decentralized digital currency
Cryptographic Protocols
complete transaction history
coin mixing service
coin mixing scheme
coin mixing
central authority
Bitcoin users
Bitcoin protocol
bitcoin
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 12:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 7:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks