Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
revocation
biblio
Attribute-based proxy re-encryption method for revocation in cloud storage: Reduction of communication cost at re-encryption
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
revoked users
easy storage
huge communication costs
hybrid encryption scheme
matching attributes
privacy concerns
Proxy re-encryption
proxy re-encryption method
revocation
data privacy
Syalim encryption scheme
symmetric encryption scheme
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
AES key
Scalability
Servers
Access Control
Cryptography
Data Security
encryption
abe
advanced encryption standard
Cloud Computing
attribute-based encryption
Attribute-Based Encryption (ABE)
Big Data
cloud storage
communication cost
Computational efficiency
data owner
biblio
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction
Submitted by grigby1 on Fri, 09/28/2018 - 3:12pm
resilience
pubcrawl
revocation
Scalability
digital signatures
group signatures
time-bound keys
biblio
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
Submitted by grigby1 on Thu, 06/07/2018 - 3:15pm
scalable system
PKI
privacy
privacy concerns
Protocols
Prototypes
pubcrawl
Rapid7
resilience
Resiliency
revocation
Scalability
online front-ends
security of data
Servers
space-efficient filter cascade data structure
SSL certificate revocations
SSL revocation checking
SSL Trust Models
TLS certificate revocations
TLS revocation checking
Transport Layer Security
University of Michigan
data structures
Browsers
certificate transparency
client-server systems
CRL
CRL checking
CRLite servers
CRLs
CRLSet
Cryptography
data privacy
Bloom filter
fail-closed security posture
Firefox
Google Certificate Transparency
Human behavior
internet
Metrics
OCSP
OCSP checking
OCSP Stapling
OneCRL
biblio
Accumulators with Applications to Anonymity-Preserving Revocation
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Human behavior
zero-knowledge proofs
user authentication
Theorem Proving
RSA-based dynamic accumulator
revocation functionality
revocation
Resiliency
resilience
public key cryptography
pubcrawl
Plugs
optimal communication complexity
Metrics
message authentication
membership revocation
accumulators
Heuristic algorithms
Cryptography
cryptographic applications
composability
Complexity theory
communication complexity
Braavos construction
authentication
ARC
anonymous revocation component
anonymous credentials
anonymous credential systems
anonymity-preserving revocation
anonymity
Additives
biblio
Reliable Data Sharing Using Revocable-Storage Identity-Based Encryption in Cloud Storage
Submitted by grigby1 on Mon, 03/19/2018 - 1:36pm
Identity-based encryption
storage management
shared data
security
secure file sharing system
Secure File Sharing
revocation
revocable-storage identity
Resiliency
resilience
reliable data sharing
Receivers
pubcrawl
Metrics
authorisation
Human behavior
encryption scheme
encryption
efficient revocation scheme
data sharing
Cryptography
cryptographically enhanced access control
composability
cloud storage
cloud server
Cloud Computing
authorization
biblio
Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access Control
Submitted by grigby1 on Thu, 12/28/2017 - 1:40pm
decentralized CP-ABE
Software Architecture
security scalability
security degradations
Scalability
revocation
pubcrawl
multi-authority architecture
Multi-authority
group sharing applications
flexible access policies
encryption
Access Control
decentralized attribute-based encryption access control
data confidentiality
Cryptography
cryptographic method
computer architecture
Companies
cloud environment
Cloud Computing
authorization
attribute-based encryption
attribute revocation
biblio
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE Without Knowledge of the Plaintext
Submitted by grigby1 on Fri, 10/27/2017 - 12:19pm
Compositionality
Metrics
pubcrawl
Resiliency
Human behavior
constant size
identity-based broadcast encryption
recipients
revocation
Asymmetric Encryption
biblio
Scalable Revocation Scheme for Anonymous Credentials Based on N-times Unlinkable Proofs
Submitted by grigby1 on Mon, 05/22/2017 - 2:02pm
attribute-based credentials
blacklisting
e-ticketing
EID
privacy
pubcrawl
revocation
Scalability
security scalability
smart-cards
file
Game Theory Meets Network Security and Privacy
Submitted by awhitesell on Thu, 02/09/2017 - 4:06pm
Science of Security
Cryptography
game theory
intrusion detection system
location privacy
multiparty computation
network security and privacy
NSA SoS Lablets Materials
revocation
Science of Security
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
UIUC
wireless security
UIUC
NSA SoS Lablets Materials
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
biblio
Game Theory Meets Network Security and Privacy
Submitted by awhitesell on Thu, 02/09/2017 - 1:12pm
Science of Security
NSA SoS Lablets Materials
Science of Security
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
UIUC
game theory
network security and privacy
intrusion detection system
location privacy
revocation
wireless security
Cryptography
multiparty computation
UIUC
NSA SoS Lablets Materials
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
« first
‹ previous
1
2