Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
group theory
biblio
Perfect Secrecy in the Bounded Storage Model
Submitted by aekwall on Fri, 02/25/2022 - 10:43am
Cryptography
Protocols
Conferences
pubcrawl
Resiliency
Global communication
Compositionality
faces
Predictive Metrics
Secure storage
Additives
Bounded storage model
group theory
information-theoretic security
provable security
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-Type Groups
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
noncyclic groups
statistical parameter
single malicious server
server computation
secure outsourcing
secure delegation
Scalability
RSA-based group cryptosystems
RSA
Resiliency
public-key cryptosystems
public key cryptography
pubcrawl
probability
cloud computing application scenarios
modular exponentiations
group theory
group exponentiation
fixed-exponent exponentiation
exponentiation
discrete logarithm problem
delegation protocol
cyclic groups
cryptography algorithms
Cryptography
Cryptographic Protocols
cloud server computation
biblio
Symmetric Eigen-Wavefunctions of Quantum Dot Bound States Resulting from Geometric Confinement
Submitted by grigby1 on Tue, 12/17/2019 - 12:31pm
privacy
wave functions
symmetry
symmetric properties
Symmetric matrices
symmetric eigen-wavefunctions
Strain
Shape
semiconductor quantum dots
Resiliency
resilience
Quantum dots
quantum dot symmetry related effects
quantum dot shapes
quantum dot bound states
pubcrawl
bound states
intrinsic geometric symmetry
group theory
group representation theory
geometric confinement
finite element analysis
Ellipsoids
Eigenvalues and eigenfunctions
cyber-physical systems
cyber-physical system
Crystals
crystal structure
crystal periodic structure
confinement
computational geometry
composability
biblio
Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server
Submitted by grigby1 on Wed, 09/05/2018 - 10:45am
exponentiation
Control Theory
Cryptography
discrete logarithms
group theory
Human behavior
human factor
modular exponentiations
privacy
pubcrawl
resilience
Resiliency
Scalability
secure delegation
secure outsourcing
biblio
On the security of a certificateless signcryption scheme
Submitted by BrandonB on Wed, 05/06/2015 - 11:02am
encryption
Security analysis
Receivers
public key encryption
public key cryptography
Public key
key replacement attack
IND-CCA2 security
group theory
Games
certificateless signcryption scheme
discrete logarithm problem
Digital Signcryption
digital signatures
digital signature
Diffie-Hellman problem
Cryptography
cryptographic primitive
concrete attack approach
Computers