Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user data
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 12:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Secure storage
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Focusing
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
data owner
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
Broadcast Encryption
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
biblio
TensorClog: An Imperceptible Poisoning Attack on Deep Neural Network Applications
Submitted by grigby1 on Wed, 11/04/2020 - 1:12pm
resilience
neural nets
Neural networks
Perturbation methods
poisoning attack
privacy
privacy protection purpose
pubcrawl
real-world application
lower inference accuracy
Resiliency
Scalability
security of data
TensorClog poisoning technique
test error
Training
user data
user privacy violations
deep neural network applications
adversarial attack
AI Poisoning
CIFAR-10 dataset results
converged training loss
data converges
data privacy
data results
deep learning
abusive data collection
deep neural networks
different limited information attack scenarios
feature extraction
Human behavior
imperceptible poisoning attack
internet
Internet application providers
learning (artificial intelligence)
biblio
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
single cloud environment
cloud storage service
CP-ABE algorithm
multi-cloud
multicloud architecture
multicloud CP-ABE
privacy leakage
Privacy-preserving
privacy-preserving CP-ABE access control scheme
share data
cloud storage environment
single cloud scheme
single-cloud CP-ABE
suitable security access control technology
user attribute set
user collusion attack
user data
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
collaboration
pubcrawl
encryption
Access Control
authorisation
Cloud Computing
data privacy
Servers
Scalability
storage management
privacy
Cryptography
policy-based governance
CP-ABE
encryption scheme
access control overhead
access policy tree
achieving privacy-preserving CP-ABE access control
ciphertext-policy
cloud storage
biblio
Secure and Privacy Preserving Pattern Matching in Distributed Cloud-based Data Storage
Submitted by aekwall on Mon, 07/13/2020 - 10:05am
arrays
user privacy in the cloud
text searching
string matching problem
simple data structure
semitrusted cloud providers
privacy-preserving matching algorithm
privacy preserving pattern
index arrays
encrypted index
distributed cloud-based datasets
distributed cloud-based data storage
privacy preserving
confidentiality
Cloud Computing
storage management
Scalability
Indexes
data structures
pattern matching
Distributed databases
Metrics
pubcrawl
Resiliency
data privacy
user data
Cryptography
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
biblio
Deep Web Online Anonymity
Submitted by grigby1 on Mon, 04/02/2018 - 11:30am
resilience
Internet user
Logic gates
Metrics
online anonymity
personal information sharing
privacy
privacy protection
pubcrawl
internet
Resiliency
social hub
social media
social networking (online)
Terrorism
user data
Vulnerabilities of Social Media
cyber space
anonymity
Browsers
composability
Computer crime
Computer hacking
Computers
crime
Cryptography
Anarchy
Cyberspace Anonymity
Data protection
deep web
Government
hidden encrypted network
Human behavior
information privacy
biblio
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
Submitted by grigby1 on Fri, 11/03/2017 - 10:27am
Intrusion Detection
user file encryption
user data
Resiliency
ransomware behavior analysis
ransomware attacks
Ransomware
pubcrawl
Monitoring
Metrics
malware
invasive software
Intrusion Detection Systems
antivirus
Human behavior
file decryption
Entropy
encryption
early-warning detection system
Data protection
CryptoLock
Cryptography
composability
behavioral analysis
behavior indicators
arrays