Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure outsourcing
biblio
Secure Delegation to a Single Malicious Server: Exponentiation in RSA-Type Groups
Submitted by grigby1 on Mon, 12/30/2019 - 1:18pm
noncyclic groups
statistical parameter
single malicious server
server computation
secure outsourcing
secure delegation
Scalability
RSA-based group cryptosystems
RSA
Resiliency
public-key cryptosystems
public key cryptography
pubcrawl
probability
cloud computing application scenarios
modular exponentiations
group theory
group exponentiation
fixed-exponent exponentiation
exponentiation
discrete logarithm problem
delegation protocol
cyclic groups
cryptography algorithms
Cryptography
Cryptographic Protocols
cloud server computation
biblio
Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server
Submitted by grigby1 on Wed, 09/05/2018 - 9:45am
exponentiation
Control Theory
Cryptography
discrete logarithms
group theory
Human behavior
human factor
modular exponentiations
privacy
pubcrawl
resilience
Resiliency
Scalability
secure delegation
secure outsourcing
biblio
Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 11:24am
public cloud storage
internet
outsourcing
outsourcing protocol
Policy
privacy
Privacy Policies
Protocols
pubcrawl
integrity
QP Protocol
Quadratic programming
Scalability
secure outsourcing
secure protocol
security of data
storage management
clients cloud provider
information technology
Human behavior
encryption
data storage
data security correctness
data privacy
data confidentiality
confidentiality
computer user
computer system
cloud technology
cloud computing technology
cloud computing data storage technology
Cloud Computing
cloud access
biblio
Secure and Verifiable Outsourcing of Nonnegative Matrix Factorization (NMF)
Submitted by grigby1 on Mon, 05/22/2017 - 12:52pm
Cloud Computing
collaboration
composability
Human behavior
information theoretic security
Metrics
nmf
pubcrawl
Resiliency
Scalability
secure outsourcing
verification
biblio
Efficient Secure Outsourcing of Large-scale Quadratic Programs
Submitted by grigby1 on Mon, 04/24/2017 - 10:42am
Big Data
big data privacy
big data security
big data security in the cloud
composability
Human behavior
parallel computing
pubcrawl
quadratic programs
Resiliency
secure outsourcing