Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data authentication
biblio
Multi-Level Authentication Scheme for Improving Privacy and Security of Data in Decentralized Cloud Server
Submitted by grigby1 on Mon, 05/09/2022 - 3:36pm
Resistance
global identifier
Collusion Resistance
cloud server
Attribute authority
user privacy in the cloud
data authentication
Aerospace electronics
Scalability
Cloud Computing
Data Security
data privacy
authorization
authentication
Resiliency
resilience
pubcrawl
biblio
MixCAN: Mixed and Backward-Compatible Data Authentication Scheme for Controller Area Networks
Submitted by aekwall on Tue, 09/07/2021 - 10:12am
Cryptography
Bandwidth
authentication
Protocols
microsoft windows
pubcrawl
Resiliency
Internet of Things
standards
controller area networks
data authentication
electronic control units
in-vehicle security
controller area network security
cyber-physical systems
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 12:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
Permissioned blockchain Network
medical care providers
medical data items
medical information systems
medical record sharing
Medical services
patient care
patient care-cycle
patient data
patient Emergency relevant medical data
patient visits
patient walk
Peer-to-peer computing
hospitals
prehospital death rates
pubcrawl
Scalability
Scalable blockchain
scalable data source
Scalable Security
secure data source
security of data
Servers
trauma care
trauma centers
emergency medical care
blockchain
blockchain technology
confidentiality
continuous recording system
data audibility
data authentication
data privacy
data scalability
Data Security
distributed ledger
electronic data interchange
annual mortality rate
Emergency medical services
emergency patient death rate
emergency services
emergency-relevant medical data
Fabrics
file transfer methods
health care
health care delivery system
healthcare providers
healthcare settings
high quality prehospital care
file
Data-driven Real-time Data Authentication in Wide-Area Energy Infrastructure Sensor Networks
Submitted by Yilu Liu on Fri, 01/10/2020 - 3:38pm. Contributors:
Yilu Liu
Shutang You
Shengyuan Liu
Wenxuan Yao
sensor networks
data authentication
machine learning
power grids
Posters
1931975
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Blockchain IoT (BIoT): A New Direction for Solving Internet of Things Security and Trust Issues
Submitted by aekwall on Mon, 04/01/2019 - 9:04am
data authentication
trusted computing resources
Trusted Computing
transaction forgery
Software
sensors data
sensor data
security
secure microcontrollers
Random access memory
pubcrawl
Internet of Things security
Internet of Things
authentication
Cryptography
cryptographic signatures
controller entities
computer network security
blockchain transactions
blockchain security
blockchain platforms
blockchain operation
Blockchain IoT
blockchain infrastructure
blockchain
biblio
Intrusion detection systems in MANETs using hybrid techniques
Submitted by grigby1 on Wed, 06/20/2018 - 11:23am
RSA algorithm
mobile ad hoc networks
pubcrawl
public key cryptography
resilience
Resiliency
Routing
Routing protocols
RSA
Metrics
security
security of data
self organized wireless technologies
SHA 256 hashing technique
telecommunication security
ZRP
ZRP routing protocol
AES
MANET
intrusion detection system technique
Intrusion Detection
IDS technique
hybrid cryptographic technique
enhanced adaptive acknowledgement
EAACK
data authentication
Cryptography
Cryptographic Protocols
Compositionality
base station
AODV routing protocol
AODV
AES algorithm
biblio
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data
Submitted by grigby1 on Tue, 05/16/2017 - 11:46am
composability
data authentication
data verification
hash outsourcing
pubcrawl
snargs
trustworthiness
trustworthy
verifiable computing
biblio
Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
data sharing
set theory
secure data exchange
public network
pubcrawl170107
private key cryptography
private key attribute set
military aircraft
file sharing
encryption
electronic data interchange
data sharing systems
Access Control
Data Security
data encryption
data authentication
CP-ABE
confidentiality feature
ciphertext-policy attribute-based encryption
authentication feature
authentication
asymmetric encryption mechanism
Ad hoc networks