Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrity checking
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
integrity checking program generation
composability
pubcrawl
Human behavior
Resiliency
timing information
Raspberry Pi
POWERALERT
Power measurement
power aware computing
power attestation
network round-trip time
Nash equilibrium strategy
Kernel
attestation
integrity checking
game-theoretic strategy
game theory
Frequency measurement
Current measurement
code segment
checking code
attestation systems
Adaptation models
Protocols
security
data integrity
biblio
Efficient Scheme for Dynamic Cloud Data Shared Within a Static Group with Privacy Preserving Auditing and Traceability
Submitted by grigby1 on Thu, 01/31/2019 - 11:24am
cloud
composability
integrity checking
Metrics
Outsourced Database Integrity
pubcrawl
resilience
Resiliency
ring signature
Scalability
shared dynamic data
static group
Traceability
user privacy
user privacy in the cloud
biblio
Cloud Storage Integrity Checking: Going from Theory to Practice
Submitted by grigby1 on Tue, 01/16/2018 - 5:16pm
cloud storage
composability
gap
integrity checking
Metrics
Outsourced Database Integrity
pubcrawl
Resiliency
theory and practice
biblio
Cloud Storage Integrity Checking: Going from Theory to Practice
Submitted by grigby1 on Tue, 08/22/2017 - 10:36am
cloud storage
gap
integrity checking
Metrics
outsourced database security
pubcrawl
Resiliency
Scalability
theory and practice
biblio
Efficient and Concurrent Reliable Realization of the Secure Cryptographic SHA-3 Algorithm
Submitted by BrandonB on Wed, 05/06/2015 - 10:49am
injection-based fault simulations
Transient analysis
step-forward toward
SHA-3 algorithm
security
secure hash algorithm (SHA)-3
secure hash algorithm
rotated operand-based scheme
robust hardware implementations
Reliability
pseudorandom number generation
performance overheads
parallel processing
low-complexity recomputing
Keccak
integrity checking
acceptable complexity
high-performance concurrent error detection scheme
high performance
hashing
hardware overhead reduction
Hardware
error detection
error coverage
Cryptography
concurrency control
computational complexity
Circuit faults
ASIC analysis
Application-specific integrated circuit (ASIC)
application specific integrated circuits
Algorithm design and analysis