Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security scheme
biblio
Collaborative KP-ABE for cloud-based Internet of Things applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
Internet of Things
Trusted Computing
trusted assistant nodes
storage management
storage capacities
Servers
sensors
security scheme
Scalability
resource-limited networks
pubcrawl
policy-based governance
Performance analysis
KP-ABE
key-policy attribute-based encryption
key policy attribute based encryption
Access Control
encryption
Cryptography
cryptographic scheme
computer network security
collaborative KP-ABE
collaboration
cloud-based IoT applications
cloud-based Internet of Things applications
cloud servers
cloud resources
Cloud Computing
C-KP-ABE
authorisation
Asymmetric Encryption
access control solutions
biblio
Protecting Messages Using Selective Encryption Based ESI Scheme for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
Selective Encryption
wired networks
reasons MANET
protecting messages
misbehaving node
ESI scheme
encryption scheme
dynamic topology
centralized administrator
ample protection
MANET security
mobile nodes
message passing
telecommunication security
security scheme
Compositionality
mobile ad hoc network
telecommunication network topology
mobile ad hoc networks
MANET
Metrics
Routing protocols
pubcrawl
Resiliency
Cryptographic Protocols
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
Towards A Scalable Symmetric Key Cryptographic Scheme: Performance Evaluation and Security Analysis
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
Block Cipher
Scalable Security
Weak keys
Ultra Gridsec
stream cipher algorithm
stream cipher
scalable symmetric key cryptographic scheme
peer-to-peer desktop grid framework
multithreading
grid computing security
cryptography security
block cipher encryption algorithm
Cryptography
security scheme
Instruction sets
Ciphers
security attributes
grid computing
Scalability
Throughput
performance evaluation
Peer-to-peer computing
pubcrawl
encryption
biblio
A Security Scheme for Fog Computing Environment of IoT
Submitted by grigby1 on Tue, 01/21/2020 - 10:39am
Fog computing
IoT
pubcrawl
resilience
Resiliency
Scalability
security
security scheme
biblio
Fog-Based Internet of Things: A Security Scheme
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
IoT devices
traditional data center
time-sensitive applications
security scheme
Scalability
response time
Resiliency
pubcrawl
Protocols
nearby light-weight middleware
MQTT protocol
MQTT
middleware
Fog computing
IoT
Internet of Things
Internet of Thing stack models
fog-based Internet of Things
Fog Computing and Security
Fog based IoT
edge computing
computer network security
computer architecture
Cloud-based IoT
Cloud Computing
security
biblio
Secure routing against DDoS attack in wireless sensor network
Submitted by grigby1 on Tue, 01/16/2018 - 5:29pm
pubcrawl
WSNs
wireless sensor networks
Wireless Sensor Network
UDP messages
TCP messages
sink node
sensor placement
sensor nodes
security scheme
security Algorithm
secure routing protocol
Routing protocols
Routing
Resiliency
composability
Monitoring
Metrics
message passing
IPS node
IPS
IP networks
intrusion prevention scheme
intrusion
Human behavior
DDoS Attack Prevention
DDoS Attack
computer network security
Computer crime