Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Computational efficiency
biblio
An Efficient Hybrid Signcryption Scheme With Conditional Privacy-Preservation for Heterogeneous Vehicular Communication in VANETs
Submitted by grigby1 on Thu, 09/16/2021 - 11:10am
Public key
vehicular ad hoc networks
vehicle
Signcryption
Resiliency
resilience
Repudiation
Receivers
public key infrastructure
composability
pubcrawl
privacy
Metrics
identity-based cryptosystem
Human behavior
heterogeneous communication
Computational efficiency
biblio
An Adaptive Erasure-Coded Storage Scheme with an Efficient Code-Switching Algorithm
Submitted by grigby1 on Wed, 09/01/2021 - 2:15pm
adaptive scheme
code switch
Computational efficiency
Conferences
degraded read
distributed computing
erasure code
fault tolerance
Fault tolerant systems
i-o systems security
pubcrawl
Scalability
Switches
telecommunication traffic
biblio
An Elliptic Curve-based Protocol for Privacy Preserving Frequency Computation in 2-Part Fully Distributed Setting
Submitted by aekwall on Tue, 07/27/2021 - 2:06pm
Elliptic Curve Cryptosystem
Systems engineering and theory
secure multi-party computation
Resiliency
pubcrawl
Protocols
privacy-preserving data mining
Privacy preserving frequency computation
privacy
Knowledge engineering
theoretical cryptography
Elliptic curve cryptography
data privacy
Computing Theory and Privacy
Computing Theory
Computational efficiency
2-part fully distributed setting
Compositionality
composability
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
Homomorphic encryption
storage paradigm
Scalability
Resiliency
public-key cryptosystem
pubcrawl
Paillier homomorphic encryption scheme
Paillier homomorphic cryptosystem
paillier cryptosystem
modular multiplicative arithmetic
Metrics
improved decryption process
Human Factors
Algorithm
fast decryption process
fast decryption algorithm
encryption
encrypted data
decryption speed
decryption
data privacy
Cryptography
Computational efficiency
computational cost
Complexity theory
Cathode ray tubes
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 11:35am
fuzzy set theory
Fuzzy Cryptography
symmetric cryptographic algorithms
suitable cryptographic algorithm
SHA256
fuzzy analytic hierarchy process
FAHP
experts grading method
ECDSA
asymmetric cryptographic algorithms
financial data processing
AES
cryptographic algorithms
security
cryptocurrencies
analytic hierarchy process
Distributed databases
blockchain
Metrics
Cryptography
pubcrawl
Resiliency
Hardware
data privacy
Computational efficiency
Scalability
biblio
Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
asymmetric case
type-3 pairing
TEPLA library
Ostrovsky-Sahai-Waters
original ABKEM
one-way-CCA security
concurrent man-in-the-middle security
challenge-and-response protocol
challenge and response
BN curve
attribute-based key-encapsulation mechanisum
attribute based
asymmetric pairing
Cryptographic Protocols
asymmetric bilinear map
ABAuth
Asymmetric Encryption
Computational efficiency
Compositionality
authentication
digital signatures
Metrics
pubcrawl
Human behavior
Resiliency
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Asymmetric Encryption
securing multiparty communication
MultiRSA
multiple recipients
Multi-recipient Encryption
lightweight scalable multirecipient asymmetric cryptographic scheme
lightweight AMOUN
high computational cost
group membership changes
dynamic networks
chosen plaintext attack
Chinese remainder theorem
Cathode ray tubes
asymmetric cryptography
communication overhead
encryption
network resources
symmetric cryptography
Compositionality
Security analysis
public key cryptography
Public key
Metrics
privacy
pubcrawl
Human behavior
Resiliency
decryption
Computational efficiency
biblio
Fast Bi-dimensional Empirical Mode based Multisource Image Fusion Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 4:54pm
Hilbert transforms
Wireless communication
variable neighborhood window method
surface interpolation
source image features
pubcrawl
multisource image fusion decomposition
microsoft windows
Metrics
Market research
interpolation
Image reconstruction
image fusion
image decomposition
BEMD method
Hermite interpolation reconstruction method
Hermite interpolation
fixed neighborhood window method
fast bi-dimensional empirical mode decomposition
Empirical mode decomposition
details information
decomposition
cyber physical systems
Computational efficiency
Compositionality
BIMF
bi-dimensional intrinsic mode functions
bi-dimensional empirical mode decomposition
biblio
Distributed Access Control with Outsourced Computation in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 11:52am
encryption
traditional cloud computing
security of data
Scalability
Resiliency
pubcrawl
performance evaluation
outsourced computation
network terminal devices
IoT
Internet of Things
fog device
Fog Computing and Security
fine-grained access control
Fog computing
edge computing
distributed processing
distributed access control
data storage
Cryptography
Computational efficiency
computational complexity
Cloud Computing
big data transmission
Big Data
attribute based-encryption
Access Control
security
biblio
Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
Elliptic curve cryptography
public signature verification problem
proxy signature scheme
private key exposure
FoSPS
forward secure proxy signature
directed signature scheme
cryptoanalysis
Computer security and privacy
handwriting recognition
ECC
Scalability
Security analysis
public key cryptography
digital signatures
pubcrawl
Resiliency
private key cryptography
data privacy
Computational efficiency
digital signature
« first
‹ previous
1
2
3
4
next ›
last »