Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
revocation
biblio
Re-Encryption Model for Multi-Block Data Updates in Network Security
Submitted by aekwall on Fri, 02/17/2023 - 10:50am
Data visualization
Safe Coding
Update Code Online Data Reconstruction
revocation
re-encryption
cloud storage
Advanced Encryption Standards
data centers
codes
Data models
policy-based governance
network security
Resiliency
Metrics
pubcrawl
encryption
Cloud Computing
Human Factors
biblio
An Improvement on “CryptCloud$^\textrm+\$$: Secure and Expressive Data Access Control for Cloud Storage”
Submitted by grigby1 on Tue, 12/20/2022 - 7:30pm
public key cryptography
Authority Accountability
abe
auditing
Traceability
revocation
white box cryptography
Mathematics
Electronic mail
encryption
Computer bugs
composability
Access Control
Resiliency
resilience
Metrics
pubcrawl
Cloud Computing
biblio
Highly Efficient and Revocable CP-ABE with Outsourcing Decryption for IoT
Submitted by grigby1 on Tue, 04/19/2022 - 4:42pm
Ciphertext Policy ABE
Communication channels
Computational modeling
Costs
CP-ABE
encryption
information security
Internet of Things
outsourced decryption
outsourcing
Pairing-Free
policy-based governance
pubcrawl
revocation
Scalability
standards
biblio
O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System
Submitted by grigby1 on Tue, 04/19/2022 - 4:41pm
Chameleon hash function
cloud-assisted Internet of Medical Things (IoMT)
Cloud Computing
CP-ABE
Ecosystems
encryption
Internet of Things
Medical services
online/offline attribute-based encryption (ABE)
outsourced decryption
policy-based governance
pubcrawl
revocation
Scalability
Servers
Telecommunications
biblio
Efficient Conversion Scheme Of Access Matrix In CP-ABE With Double Revocation Capability
Submitted by aekwall on Tue, 05/25/2021 - 3:19pm
authorization
Cauchy matrix
Chinese remainder theorem
Cloud Computing
Conferences
CP-ABE
data privacy
encryption
Informatics
policy-based governance
pubcrawl
revocation
Scalability
biblio
Online/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing
Submitted by aekwall on Mon, 02/15/2021 - 4:49pm
reusable ciphertext pool
large universe MA-CP-ABE scheme
Multi-Authority Attribute-Based Encryption
online-offline revocable multiauthority attribute-based encryption
Online/Offline Encryption
pubcrawl
q-DPBDHE2 assumption
Resiliency
resource-constrained users
IoT
revocation
revocation mechanism
security problems
users access privilege
users initialization phase
valid ciphertext
waste system resources
authorisation
invalid ciphertext
Internet of Things
illegal ciphertext
fine-grained access control
encryption computational cost
efficient encryption
edge computing
data encryption algorithm
cyber physical systems
Cryptography
cross domain applications
composability
Cloud Computing
Ciphertext Verification.
ciphertext verification
biblio
Policy-based Revolutionary Ciphertext-policy Attributes-based Encryption
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
TA
Trusted authority (TA)
revocation
policy-based revolutionary ciphertext-policy attribute-based encryption scheme
policy revocation
policy identity number
PHR testing
Personal Health Records (PHRs)
personal health record testing
flexible updating policy control
cryptographic mechanism
Ciphertext-policy Attributes-based Encryption (CP-ABE)
CP-ABE scheme
Cloud Computing
Systems architecture
trusted authority
hospitals
policy-based governance
pubcrawl
Human behavior
private key cryptography
attribute-based encryption
encryption
Servers
Scalability
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
key exposure
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
revocation
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
power engineering computing
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
Ciphers
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
1
2
next ›
last »