Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Proxy re-encryption
biblio
Efficient Public Verification of Confidential Supply-Chain Transactions
Submitted by grigby1 on Thu, 01/05/2023 - 1:28pm
pubcrawl
resilience
Resiliency
Protocols
Production
network security
secret sharing
Sociology
supply chains
Homomorphic encryption
distributed ledger
Pressing
supply chain security
Distributed Ledger Technology
Proxy re-encryption
supply-chain verification
biblio
Parallel Proxy Re-Encryption Workload Distribution for Efficient Big Data Sharing in Cloud Computing
Submitted by aekwall on Mon, 01/10/2022 - 11:47am
Human behavior
Compositionality
Resiliency
Workload distribution
Proxy re-encryption
parallel computing
Big data sharing
Asymmetric Encryption
Load management
Task Analysis
Metrics
pubcrawl
Heuristic algorithms
Servers
Cloud Computing
Big Data
delays
biblio
Image And Text Encrypted Data With Authorized Deduplication In Cloud
Submitted by grigby1 on Tue, 04/27/2021 - 11:30am
Software
Secure File Sharing
Role authorized tree
Proxy re-encryption
privacy leakage
Approved deduplication
composability
information technology
Computational modeling
encryption
Resiliency
resilience
Metrics
Human behavior
pubcrawl
Servers
security
Cloud Computing
biblio
Re-encrypted Data Access Control Scheme Based on Blockchain
Submitted by aekwall on Mon, 03/22/2021 - 12:09pm
Cloud Computing
Access Control
encryption
Proxy re-encryption
Resiliency
pubcrawl
privacy
blockchain
Aerospace electronics
expandability
Compositionality
privacy protection
Thermal stability
RBAC
biblio
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
surveillance videos
Proxy Reencryption
pubcrawl
public safety applications
public safety scenarios
realistic simulation environment
Resiliency
road safety
storage management
streaming
Proxy re-encryption
trusted control center
Unmanned Aerial Vehicles
Video communication
video recording
video streaming
video surveillance
video transmission
Videos
encryption
Cloud Computing
cloud storage
composability
Cryptography
cyber physical systems
data privacy
drones
efficient drone video sharing
efficient encryption
autonomous aerial vehicles
Intelligent Transportation Systems
law enforcement
Long Term Evolution
original encryption key
privacy
privacy concerns
privacy preserving
privacy-preserving Sharing
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
biblio
An Anonymous Attribute-based Access Control System Supporting Access Structure Update
Submitted by aekwall on Mon, 07/06/2020 - 8:57am
policy-based governance
hidden access structures
cloud-based cryptographic system
cloud service provider
anonymous attribute-based encryption
anonymous attribute-based access control system
access structure update
personal data
fine-grained access control
outsourcing
cryptology
Metrics
Cloud Computing
pubcrawl
Human behavior
Resiliency
Proxy re-encryption
data privacy
data owner
attribute-based encryption
data confidentiality
Cryptography
authorisation
Scalability
biblio
Proxy Re-Encryption using MLBC (Modified Lattice Based Cryptography)
Submitted by grigby1 on Fri, 06/26/2020 - 11:43am
encrypted message
efficient encryption
secure proxy re-encryption
Re-encryption time
public key encryption
Proxy re-encryption
proxy key generation time
Modified Lattice Based Cryptography
MLBC
minimal trust proxy
maximum key privacy
Cryptography
efficient proxy re-encryption
cyber-physical systems
resilience
Resiliency
composability
pubcrawl
public key cryptography
data privacy
security
biblio
Fog-Based Secure Communications for Low-Power IoT Devices
Submitted by grigby1 on Tue, 01/21/2020 - 10:39am
authorization
confidentiality
encryption
Fog computing
Internet-of-Things
Proxy re-encryption
pubcrawl
Publish/Subscribe
resilience
Resiliency
Scalability
secure communications
security
biblio
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
Submitted by grigby1 on Tue, 01/07/2020 - 9:54am
encrypted files
secure data sharing
Resiliency
resilience
re-encryption keys
Public key
pubcrawl
Proxy re-encryption
protecting sensitive files
key-aggregate proxy re-encryption scheme
Key-Aggregate Cryptosystem
key-aggregate approach
encryption
Access Control
efficient key-aggregate proxy re-encryption
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
conditional proxy re-encryption schemes
computer science
composability
cloud servers
Cloud Computing
authorisation
1
2
next ›
last »