Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
random oracle model
biblio
Security Analysis of a Certificateless Signcryption Mechanism without Bilinear Mapping
Submitted by grigby1 on Thu, 09/16/2021 - 11:12am
Bilinear Pairing
certificateless signcryption
composability
Computational modeling
computer security
Human behavior
Metrics
pubcrawl
public key cryptography
random oracle model
Receivers
Repudiation
resilience
Resiliency
unforgeability
biblio
Improved Veron Identification and Signature Schemes in the Rank Metric
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
probability
veron identification
Transforms
smallest signature
signature size
Security Metrics
secure signature scheme
rank metric
random oracle model
quantum cryptography
quantum computing
public key size
public key cryptography
pubcrawl
Protocols
cheating probability
Metrics
Measurement
linear codes
identification protocol
Fiat-Shamir transform
error-correcting codes
error correction codes
double circulant codes
digital signatures
Decoding
Cryptography
Computing Theory
code-based signature schemes
biblio
Exploring Automation in Proofs of Attribute-based Encryption in the Standard Model
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
Scalability
Cryptography
attribute-based encryption
Cryptographic Protocols
Human behavior
pubcrawl
policy-based governance
cryptographic proofs
random oracle model
proof automation
Waters ciphertext-policy attribute-based encryption scheme
biblio
Efficient and Secure Proxy re-signature Message Authentication Scheme in Vehicular Ad Hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 10:19am
Metrics
vehicular ad hoc networks
vehicular ad hoc network
VANET
Trusted Computing
trusted center traceability
security requriements
secure proxy resignature message authentication scheme
roadside unit
Resiliency
random oracle model
public key cryptography
proxy re-signature
privacy protection problem
pubcrawl
Internet of Vehicles
formal verification
Elliptic curves
elliptic curve
efficiency requirements
efficiency analysis
ECDLP hard problem
digital signatures
data privacy
conditional privacy protection
Compositionality
Batch verification
Ad Hoc Network Security
biblio
ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
cloud
ROM
produced signature
issued signature
Intenet of Things
ID-based strong designated verifier signature scheme
ID-based signature scheme
Electrical Engineering
Designated verifier signature
designated verifier
BDH
random oracle model
Cloud Computing
sensors
Bilinear Pairing
Smart Home
Public key
digital signatures
pubcrawl
Resiliency
provable security
Internet of Things
digital signature
Scalability
biblio
A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
bilinear pairings
strong designated verifier
signer ambiguity
signature length
random oracle model
public key system
nontransferability
group-oriented strong designated verifier signature scheme
group-oriented
GO-SDVS scheme
constant-size signatures
constant-size
Scalability
adaptive chosen-message attacks
Oceans
computer science
handwriting recognition
public key cryptography
Public key
digital signatures
Generators
pubcrawl
Resiliency
digital signature
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
Probably Secure Multi-User Multi-Keyword Searchable Encryption Scheme in Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
Multi-user
Trapdoor indistinguishability
simulation program
Servers
security
secure multiuser multikeyword searchable encryption scheme
searchable encryption server
Resiliency
resilience
Receivers
random oracle model
public key cryptography
Public key
pubcrawl
privacal data
searchable encryption
multi-keyword
Indexes
encryption workload
encryption
decisional Diffie-Hellman
data user
data privacy
data owner
Cryptography
composability
cloud storage
Cloud Computing
cipher text keyword
biblio
Updatable Block-Level Message-Locked Encryption
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
composability
Compositionality
incremental cryptography
Merkle-hash tree
message-locked encryption
Metrics
provable security
pubcrawl
random oracle model
resilience
Resiliency
biblio
Hidden-Token Searchable Public-Key Encryption
Submitted by K_Hooper on Wed, 02/14/2018 - 12:09pm
Public key
token anonymity
security proofs
security notion
searchable encryption
Resiliency
random oracle model
public-key
public key cryptography
composability
pubcrawl
privacy
one-token-per-trapdoor
Indexes
hidden-token searchable public-key encryption
Hidden-Token
Games
encryption
1
2
next ›
last »