Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cloud server
biblio
Convergence of Cloud and Fog Computing for Security Enhancement
Submitted by grigby1 on Fri, 09/16/2022 - 4:37pm
Fog computing
Security monitoring framework
cloud server
virtual machine
Costs
Resiliency
computing resources
cyber-attack
Virtual machining
encryption
edge computing
Scalability
resilience
pubcrawl
Servers
Monitoring
security
Cloud Computing
biblio
Multi-Level Authentication Scheme for Improving Privacy and Security of Data in Decentralized Cloud Server
Submitted by grigby1 on Mon, 05/09/2022 - 4:36pm
Resistance
global identifier
Collusion Resistance
cloud server
Attribute authority
user privacy in the cloud
data authentication
Aerospace electronics
Scalability
Cloud Computing
Data Security
data privacy
authorization
authentication
Resiliency
resilience
pubcrawl
biblio
Implicit Certificate Based Signcryption for a Secure Data Sharing in Clouds
Submitted by aekwall on Fri, 02/04/2022 - 10:31am
certificate
cloud server
Companies
composability
Costs
digital signatures
encryption
Human behavior
information processing
Media
Metrics
pubcrawl
Repudiation
Resiliency
signature
Signcryption
biblio
Practical and Secure Circular Range Search on Private Spatial Data
Submitted by aekwall on Tue, 07/27/2021 - 2:04pm
Computing Theory
privacy
circular range search
cloud server
Computing Theory and Privacy
data privacy
encryption
index privacy
Indexes
pubcrawl
query privacy
Resiliency
search problems
Servers
spatial data
Spatial databases
biblio
Three-Factor Authentication Scheme Based on Searchable Encryption and Biometric Fingerprint
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
mistrust server
token ID
three-factor authentication scheme
three factor authentication
Source code analysis
Software
Servers
searchable encryption scheme
searchable encryption
Scalability
RSA
Resiliency
pubcrawl
password
pass-code
multi-factor
biometric encryption
Metrics
fingerprint identification
fingerprint
encryption
encrypted content
decryption
Cryptography
cloud server
Cloud Computing
biometrics
biometric fingerprint
authorisation
authentication
3FA
biblio
Big Data Security and Privacy: Current Challenges and Future Research perspective in Cloud Environment
Submitted by grigby1 on Mon, 12/28/2020 - 12:40pm
Metrics
Unstructured Data
Structured Data
storage management
Servers
sensitive data storage
semistructured data
security threats
security of data
Scalability
Resiliency
resilience
pubcrawl
Organizations
Big Data
internet
Human behavior
data structures
data storage
data security challenges
Data Security
data privacy
cloud server
cloud environment
Cloud Computing
big data security
Big data privacy top
big data privacy
biblio
Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
locality-sensitive hashing
Computing Theory and Privacy
single data owner model
searchable encryption schemes
search privacy
privacy-preserving fuzzy multikeyword search
plaintext search techniques
multiple data owners
LSH
Information Leakage
fuzzy multi-keyword search.
encrypted documents
ciphertext search
Bloom filter
BF
Cloud Computing
Privacy-preserving
encryption method
cloud server
Indexes
fuzzy set theory
query processing
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Cryptography
Servers
Scalability
biblio
Machine Learning Based IoT Edge Node Security Attack and Countermeasures
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
noninvasive architecture independent machine learning attack
cloned PUF devices
Cloning
cloning accuracy
highly connected ecosystem
IoT edge node security attack
machine-learning based countermeasure
malicious attack
malicious PUF modeling
authentic PUFs
physically unclonable functions
PUF
PUF architecture
PUF designs
PUF structure
two-stage brute force attack model
ubiquitous computing devices
brute force attacks
machine learning
Internet of Things
security
Cloud Computing
Servers
computer network security
Protocols
authentication
computer architecture
Cryptography
cloud server
pubcrawl
IoT networks
IoT
IoT devices
learning (artificial intelligence)
Human Factors
policy-based governance
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
key exposure
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
revocation
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
power engineering computing
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
Ciphers
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
biblio
Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
PSO algorithms
Nature Inspired
metaheuristic algorithms
key organization
key allocation
homomorphic encryption approach
homomorphic encoding scheme
homomorphic algorithm
Homomorphic
encoding technique
encoding procedure
cloud data
resource utilization
homomorphic encryption scheme
Cloud Computing
encoding
Human Factors
cloud server
key management
particle swarm optimization
particle swarm optimisation
Metrics
resource management
pubcrawl
Resiliency
encryption
Cryptography
Scalability
1
2
3
next ›
last »