Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
forward security
biblio
ID-based Data Integrity Auditing Scheme from RSA with Forward Security
Submitted by grigby1 on Fri, 01/13/2023 - 12:46pm
Protocols
Security Audits
Scalability
RSA signature
Resists
Resiliency
resilience
Public key
pubcrawl
IDS
integrity
ID-based auditing protocol
Human behavior
forward security
Data Security
data integrity
Costs
Cloud Computing
biblio
Traceable Ciphertext Policy Attribute-based Encryption Scheme with User Revocation for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:07pm
fine-grained access control
user identity tracking
traceable ciphertext policy attribute-based encryption scheme
single user revocation
identity directory technology
forward security
ciphertext re-encryption technology
association revocation
associated user revocation
CP-ABE
user revocation
CP-ABE scheme
encryption audits
Traceability
Cloud Computing
Compositionality
Predictive Metrics
storage management
Vegetation
pubcrawl
Resiliency
private key cryptography
data privacy
cloud storage
encryption
authorisation
Access Control
Servers
biblio
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
Submitted by grigby1 on Thu, 08/13/2020 - 4:22pm
revocation overhead
privacy
privacy-preserving authentication
private key cryptography
pseudonymous certificates
pseudonyms
pubcrawl
Public key
resilience
Resiliency
n) threshold secret sharing
Roads
Scalability
secret sharing
Shamir (t
telecommunication security
VANET
vehicular ad hoc networks
vehicular communications
DCS schemes
anonymous messaging
authentication
authentication overhead
authorisation
backward security
certificate revocation list
certificate updating overhead
CPPT
data privacy
anonymous communications
ECPP scheme
EMAP scheme
forward security
framed attacks
hash chain
hash chains
hybrid scheme
message authentication
biblio
Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme
Submitted by grigby1 on Fri, 04/03/2020 - 11:55am
cryptographic hash functions
resilience
wireless sensors
sequential aggregate MAC
sequential aggregate authentication
provable security
Ma-Tsudik FssAgg MAC scheme
Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme
forward security
Cryptography
Cryptographic Hash Function
access protocols
Compositionality
Metrics
wireless sensor networks
Resiliency
pubcrawl
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 10:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates
Submitted by K_Hooper on Wed, 02/14/2018 - 11:08am
relational database security
composability
dynamic searchable symmetric encryption
forward security
pubcrawl
Resiliency
searchable encryption
biblio
Mutual Authentication Protocol for RFID Based on ECC
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
Public key
tracking attacks
telecommunication security
system internal attack
Servers
security scalability
security protocol
Scalability
RFID systems
Resists
Resiliency
radiofrequency identification
radio frequency identification
authentication
pubcrawl
Protocols
mutual authentication protocol
mutual authentication
Metrics
Internet of things security and privacy
forward security
Elliptic curve cryptography
ECC
Denial of Service attacks
Cryptographic Protocols
camouflage attacks
biblio
Lightweight RFID Authentication with Forward and Backward Security
Submitted by grigby1 on Tue, 05/16/2017 - 11:24am
authentication
backward security
composability
Compositionality
EPCGen2
forward security
pubcrawl
RFID
universal composability