Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
white box cryptography
biblio
Healthcare IoT: Benefits, vulnerabilities and solutions
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
medical data
white box cryptography
security defense
security
reverse engineering
return oriented programming techniques
Resiliency
pubcrawl
obfuscation technique
obfuscation
Monitoring
Mobile Applications
Metrics
Medical services
Medical diagnostic imaging
Access Control
medical computing
Internet of Things
implantable medical devices
implantable health gadgets
healthcare IoT system
healthcare IoT
health care
data privacy
Cryptography
Computer crime
composability
Biomedical monitoring
authorisation
biblio
[Research Paper] Combining Obfuscation and Optimizations in the Real World
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Code Obfuscation
white box cryptography
white-box encryption calls
tool-specific countermeasures
sequential pass management techniques
scheduling code transformations
rewriting systems
reverse engineer
pass scheduling problem
pass ordering
pass combinations
multicriteria optimization problem
Job shop scheduling
industrial-strength obfuscator
code tangling techniques
code obfuscator
Cryptography
program compilers
reverse engineering
Virtualization
scheduling
obfuscation
Heuristic algorithms
optimisation
tools
optimization
Metrics
composability
pubcrawl
Resiliency
Kernel
biblio
Query-Efficient Black-Box Attack by Active Learning
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
Jacobian matrices
white box cryptography
white-box attack methods
white-box attack approaches
query-efficient black-box attack
query efficiency
generated adversarial examples
CIFAR-10 dataset
adversarial attack
active learning strategy
active learning
MNIST dataset
Learning systems
Perturbation methods
Cryptography
Deep Neural Network
Entropy
machine learning model
convolutional neural nets
Training
Labeling
query processing
Neural networks
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
biblio
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
outsourced data
white box cryptography
white-box traceablity
white-box traceable CP-ABE
outsourced data security
original key owner
malicious cloud users
fully secure traceable CP-ABE system
commitment
catch people
access credentials
cloud storage service
Context
Law
fine-grained access control
Cloud Computing
outsourcing
Metrics
composability
pubcrawl
Resiliency
cloud storage
Access Control
encryption
encrypted data
Data Security
Cryptography
authorisation
ciphertext-policy attribute-based encryption
biblio
Protect white-box AES to resist table composition attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:54am
cryptographic software protection
white box cryptography
white-box cryptography
white-box attack context
white-box AES protection
WBAC
Time complexity
table-composition-targeting white-box attacks
table-composition-targeting cryptanalysis techniques
key-embedding lookup tables
key recovery attacks
De Mulder et al.'s attack
Resiliency
Billet et al.'s attack
affine mappings
Table lookup
Secret key
computational complexity
public key cryptography
Data protection
Metrics
composability
pubcrawl
biblio
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis
Submitted by aekwall on Mon, 07/20/2020 - 10:54am
Table lookup
white box cryptography
white-box lookup table generation
white-box cryptography
white-box cryptographic implementation
white-box attacks
power analysis
gray-box attack
differential computation analysis
countermeasure
Cryptography
Power demand
encoding
Correlation
Metrics
composability
pubcrawl
Resiliency
Software
Runtime
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Whitenoise encryption implementation with increased robustness to side-channel attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
design techniques
white box cryptography
whitenoise encryption algorithm implementation
White noise
static power consumption
shift registers
quadratic cost
power analysis attacks
linear cost
Hamming distance
dynamic power consumption
Cryptography
side-channel attacks
Power demand
pubcrawl
Heuristic algorithms
Robustness
Metrics
composability
Resiliency
encryption
biblio
Reproducibility of artificial multiple scattering media
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
quantum-secure authentication
nanoparticles
nanophotonics
opacity
opaque scattering media
optical communication
Optical device fabrication
Optical diffraction
physical keys
QSA
nanoparticle size
random arrangement
Scattering
secret duplication
speckle
speckle pattern
teeth
white paint
white box cryptography
physical unclonable functions
composability
Metrics
quantum cryptography
Media
pubcrawl
Adaptive optics
quantum communication
biomedical optical imaging
Resiliency
artificial multiple scattering media
coherent light illumination
complex interference
exact position
ideal optical PUF
light coherence
light interference
light scattering
biblio
White-box traceable dynamic attribute based encryption
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
Silicon
white box cryptography
white-box traceable dynamic attribute based encryption
white-box traceability
user revocation
out-sourcing decryption
multiple users
decryption keys
CP-ABE scheme
ciphertext policy
access policy
malicious users
fine-grained access control
Cloud Computing
Secret key
pubcrawl
Games
Metrics
composability
Resiliency
private key cryptography
attribute-based encryption
encryption
authorisation
Servers
« first
‹ previous
1
2
3
4
5
6
next ›
last »