Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
efficient encryption
biblio
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Submitted by aekwall on Mon, 02/15/2021 - 4:50pm
surveillance videos
Proxy Reencryption
pubcrawl
public safety applications
public safety scenarios
realistic simulation environment
Resiliency
road safety
storage management
streaming
Proxy re-encryption
trusted control center
Unmanned Aerial Vehicles
Video communication
video recording
video streaming
video surveillance
video transmission
Videos
encryption
Cloud Computing
cloud storage
composability
Cryptography
cyber physical systems
data privacy
drones
efficient drone video sharing
efficient encryption
autonomous aerial vehicles
Intelligent Transportation Systems
law enforcement
Long Term Evolution
original encryption key
privacy
privacy concerns
privacy preserving
privacy-preserving Sharing
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 4:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
biblio
Online/Offline Revocable Multi-Authority Attribute-Based Encryption for Edge Computing
Submitted by aekwall on Mon, 02/15/2021 - 4:49pm
reusable ciphertext pool
large universe MA-CP-ABE scheme
Multi-Authority Attribute-Based Encryption
online-offline revocable multiauthority attribute-based encryption
Online/Offline Encryption
pubcrawl
q-DPBDHE2 assumption
Resiliency
resource-constrained users
IoT
revocation
revocation mechanism
security problems
users access privilege
users initialization phase
valid ciphertext
waste system resources
authorisation
invalid ciphertext
Internet of Things
illegal ciphertext
fine-grained access control
encryption computational cost
efficient encryption
edge computing
data encryption algorithm
cyber physical systems
Cryptography
cross domain applications
composability
Cloud Computing
Ciphertext Verification.
ciphertext verification
biblio
A Reversible Meaningful Image Encryption Scheme Based on Block Compressive Sensing
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
encryption
secret image
reversible meaningful image encryption scheme
Resiliency
pubcrawl
plain image
meaningful image encryption
Logistics
least significant bit embedding
Image reconstruction
image compression
Image coding
final meaningful cipher image
ABCS
efficient image encryption scheme
efficient encryption
efficiency performance
cyber physical systems
Cryptography
Correlation
compressed sensing
composability
Ciphers
carrier image
Adaptive Block Compressive Sensing framework
adaptive block compressive sensing
biblio
DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
energy conservation
wireless sensor networks
voronoi diagram paradigm
Voronoi diagram
sensed data
secure data exchange
Resiliency
pubcrawl
providing security
Protocols
military surveillance
environmental monitoring
energy efficient encryption
energy consumption
Aggregation
encryption
efficient encryption
Decryption Technique
decryption
DEAVD protocol compresses data
data encryption
data communication
data aggregation
cyber physical systems
Cryptography
Cryptographic Protocols
computational geometry
composability
biblio
Research and Implementation on an Efficient Public Key Encryption Algorithm with Keyword Search Scheme
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
Public key
third-party server
third-party data
storage management
Servers
secret retrieval
searchable encryption algorithms
searchable encryption
Resiliency
query formulation
Public key Encryption with Keyword Search (PEKS)
public key encryption algorithm
public key encryption
public key cryptography
Cloud Computing
pubcrawl
NPEKS
network storage service
keyword search scheme
Keyword search
encryption
encrypted data
efficient encryption
data privacy
data confidentiality
cyber physical systems
corporate cloud storage environment
composability
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 11:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Efficient Technique Image Encryption with Cipher Block Chaining and Gingerbreadman Map
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
efficient technique image encryption
unified average change intensity
testing
secure communication
Resiliency
resilience
pubcrawl
pixel change rate
key cipher block chaining
Image Processing
Gingerbreadman map
encryption
button sensitivity
efficient encryption
digital images
digital image security
Digital Image Crypthography
cyber-physical systems
Cryptography
computer science
composability
Ciphers
cipher block chaining
biblio
Image Encryption and Decryption using Enigma Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
highly advanced technologies
secured procedure
secured image processing
Rotors
Resiliency
resilience
red intensity
pubcrawl
pixel
original RGB value
military communication
Mathematical model
image security
image encryptions
image encryption
image colour analysis
Algorithm
green intensity
enigma machine
enigma algorithm
enigma
encryption
encrypting decrypting images
efficient encryption
decryption
cyber-physical systems
Cryptography
computationally efficient procedure
composability
Breadboard
blue intensity
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »