Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
edge computing
biblio
Secure Outsourcing Algorithms of Modular Exponentiations in Edge Computing
Submitted by aekwall on Mon, 03/22/2021 - 1:14pm
Scalability
Servers
security
Protocols
Resiliency
pubcrawl
privacy
edge computing
public key cryptography
outsourcing
modular exponentiation
exponentiation
Secure outsourcing algorithms
biblio
Computational Intelligence Towards Trusted Cloudlet Based Fog Computing
Submitted by grigby1 on Tue, 03/09/2021 - 3:06pm
Scalability
optimisation
popular trust
pubcrawl
quality of service
Reliability
reputation
required trusted platform module
resilience
Resiliency
multiple cloudlets
security
security of data
tpm
trust
trust value
trust-based reputation
trusted cloudlet-based fog platform
uncertainty
Fog computing
BIOS
Cloud Computing
cloud-based services
cloudlet
cloudlet trustworthy
cloudlet-based fog computing
computational intelligence
computationally intelligent approaches
edge computing
Bio-inspired Intelligent
Fuzzy logic
fuzzy logic-based inference
Human behavior
Internet of Things
IoT user
Mathematical model
Metrics
mobile computing
biblio
Online/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing
Submitted by aekwall on Mon, 02/15/2021 - 4:49pm
reusable ciphertext pool
large universe MA-CP-ABE scheme
Multi-Authority Attribute-Based Encryption
online-offline revocable multiauthority attribute-based encryption
Online/Offline Encryption
pubcrawl
q-DPBDHE2 assumption
Resiliency
resource-constrained users
IoT
revocation
revocation mechanism
security problems
users access privilege
users initialization phase
valid ciphertext
waste system resources
authorisation
invalid ciphertext
Internet of Things
illegal ciphertext
fine-grained access control
encryption computational cost
efficient encryption
edge computing
data encryption algorithm
cyber physical systems
Cryptography
cross domain applications
composability
Cloud Computing
Ciphertext Verification.
ciphertext verification
biblio
A Descriptive Study on Homomorphic Encryption Schemes for Enhancing Security in Fog Computing
Submitted by aekwall on Mon, 02/01/2021 - 11:33am
RSA
work flow
Terminology
public key cryptosystems
public key cryptosystem
Pailier
in-direct rapid homomorphic encryption
homomorphic encryption schemes
homomorphic cryptosystem
ElGamal based algebric homomorphic encryption
crypto-algorithms
Brakerski-Gentry-Vaikuntanathan model
Application of Homomorphic Encryption
Homomorphic encryption
Fog computing
Human Factors
Cloud Computing
edge computing
security threats
False Data Injection
public key cryptography
Data protection
Metrics
privacy
pubcrawl
Resiliency
data encryption
data integrity
encryption
Data Security
Servers
Scalability
biblio
Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
Submitted by aekwall on Mon, 01/25/2021 - 1:01pm
Sensitivity
trust mechanism
target distributed systems
social structures
refined graph structure
prominent security problems
graph-based sybil detection
graph transformations
graph processing
graph preprocessing
detection performance
aerospace industry
attack graphs
heterogeneous devices
trust model
security of data
social networking (online)
Predictive Metrics
edge computing
network topology
Image edge detection
sybil attacks
graph theory
Sybil attack
composability
pubcrawl
Resiliency
Trusted Computing
security
distributed processing
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 1:33pm
contracts
trustworthiness-protection system
trustworthiness management
trustworthiness gap
trusted corporations
multiple-domain business partners
malicious falsification attacks
Isolated data islands
global trustworthiness
data trustworthiness
cloud-based prototype
blockchain-based approach
Prototypes
edge computing
Cloud Computing
Virtual machining
ethereum
trustworthiness
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Trusted Computing
Organizations
data privacy
authorisation
biblio
A Resource Management Model for Real-time Edge System of Multiple Robots
Submitted by grigby1 on Thu, 12/17/2020 - 1:54pm
resource security access control
policy-based governance
pubcrawl
real-time edge system
resilience
Resiliency
resource access control
resource allocation
resource isolation
operating systems (computers)
resource security isolation protection
robot hardware modules
Robot Operating System
robot operating systems
security
security of data
software modules
telecommunication security
isolation model
day industrial productions
edge computing
fault detection
fault location
hierarchical management
Human behavior
Human Factors
industrial robots
authorisation
light-weight edge devices
lightweight edge device
mission-critical resource classification
multi-robot systems
multilevel security data isolation transmission
multiple robot arms
multiple robots
novel resource management model
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 12:25pm
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
Building Dynamic Mapping with CUPS for Next Generation Automotive Edge Computing
Submitted by grigby1 on Wed, 12/02/2020 - 2:03pm
response latency
Logic gates
mobility management (mobile radio)
next generation automotive edge computing
next generation networks
next-generation intelligent transportation system
Prototypes
pubcrawl
resilience
Resiliency
local edge server
road traffic
Scalability
Servers
synchronisation
telecommunication control
telecommunication traffic
traffic accidents
traffic engineering computing
vehicle dynamics
data traffic
5G mobile communication
5G networks
central cloud-based approach
central server
Cloud Computing
computer architecture
control and user plane separation
coupled congestion control
CUPS
5G
Dynamic mapping
dynamic mapping traffic
edge computing
edge computing architecture
edge servers
global dynamic mapping information
Intelligent Transportation Systems
Internet of Things
IoT
biblio
Fog Radio Access Networks in Internet of Battlefield Things (IoBT) and Load Balancing Technology
Submitted by grigby1 on Tue, 11/17/2020 - 2:49pm
load balancing technology
Fog Radio Access networks
Human Factors
Industrial Internet of Things (IIoT)
Industrial IoT
Internet of Things
Internet of Things knowledge
iobt
IoT devices
joint distributed computing
load balancing strategy
Fog Radio Access Network
Load management
local computing
military communication
mobility management (mobile radio)
network edge
pubcrawl
radio access networks
resource allocation
Scalability
ultra low latency
delays
bandwidth efficiency
battlefield efficiency
battlefield Things
C-RAN
Cloud Computing
cloud radio access networks
computer architecture
computing ability
computing capability
content sharing scheme
5G mobile communication
distributed computing
distributed computing load balancing problem
edge computing
Energy Efficiency
F-RAN architecture
F-RAN nodes
fifth generation communication
Fog computing
fog equipment
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »