Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic primitives
biblio
PlaidML-HE: Acceleration of Deep Learning Kernels to Compute on Encrypted Data
Submitted by grigby1 on Fri, 08/07/2020 - 2:48pm
machine learning as a service
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving machine learning
privacy
PPML inference
PlaidML-HE
MLaaS
ML Service
ML kernels
ML front-end frameworks
AI
machine learning
learning (artificial intelligence)
inference mechanisms
Human Factors
Human behavior
Homomorphic encryption
encrypted data
deep learning kernels
data privacy
Cryptography
cryptographic primitives
compiler
biblio
Modeling Cryptographic Protocols Using the Algebraic Processor
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
Human behavior
Resiliency
remote modeling
remote computers
pubcrawl
private key cryptography
MPEI algebraic processor
Metrics
Mathematical model
key distribution protocols functionality
Key Distribution
Kerberos protocol
Kerberos
internet
information protection
algebra
El Gamal signature
education-oriented capabilities
Department of Mathematical Modeling
Data models
cryptograthic protocol
Cryptography
Cryptographic Protocols
cryptographic primitives
computer network
Computational modeling
chosen cipher text attack
automata theory
automata models
automata
biblio
A Framework for Universally Composable Diffie-Hellman Key Exchange
Submitted by grigby1 on Tue, 02/27/2018 - 1:34pm
key exchange protocols
universal composability
standards
SIGMA
security of data
reduction proofs
pubcrawl
Protocol Security
protocols building
Protocols
OPTLS
composability
ISO 9798-3
IITM model
encryption
Diffie-Hellman key exchange
DH key exchange
DH-HEMTs
Cryptographic Protocols
cryptographic primitives
Computational modeling
biblio
A Universally Composable Treatment of Network Time
Submitted by grigby1 on Tue, 02/27/2018 - 1:34pm
pubcrawl
wide-spread security loss
universally composable treatment
universally composable security framework
universal composability
UC framework
time-reliant applications
Time measurement
Servers
security-sensitive systems
real-world protocols
real-world distributed system
real-time systems
public key infrastructure
Public key
authorisation
Protocols
password expiration
network time protocols
network time
modular treatment
internet
cryptographic tools
Cryptographic Protocols
cryptographic primitives
Consensus
composability
Clocks
certificate detection revocation
biblio
Provable Secure Universal Steganography of Optimal Rate: Provably Secure Steganography Does Not Necessarily Imply One-Way Functions
Submitted by grigby1 on Mon, 07/24/2017 - 1:02pm
Compositionality
cryptographic primitives
lower bounds
Metrics
provable security
pubcrawl
Resiliency
Steganography
biblio
A decentralized approach for security and privacy challenges in the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 10:06am
Information Leakage
wireless technologies
user privacy
sensitive data management
security challenges
security
public key cryptography
privacy
personal area networks
lightweight token
IoT stakeholders
IoT deployment
Internet of Things
internet
6LoWPAN
elliptic curve digital signature algorithm
ECDSA
distributed capability-based access control mechanism
distributed access control
digital signatures
data privacy
Cryptography
cryptographic primitives
computer network security
CoAP resources
authorization
authorisation
authentication