Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cyber-physical systems
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
An Efficient Image Encryption Using Chaos Theory
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Image coding
turmoil hypothesis
section astute rearranging
Resiliency
resilience
push savvy rearranging
pubcrawl
pixel substitution
pixel shuffling
pixel replacement
pixel rearranging
Indexes
image encryption
bit-XOR activity
Entropy
encryption
efficient encryption
disorder hypothesis
decryption
cyber-physical systems
Cryptography
control systems
Conferences
composability
chaos theory
chaos
biblio
Memory Efficient High-Performance Rotational Image Encryption
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
real-time systems
optimisation
optimization
optimizations
parallel architectures
parallel rotational encryption technique
pubcrawl
Random access memory
real-time applications
memory efficient high-performance rotational image encryption
resilience
Resiliency
rotated encrypted images
rotational image encryption technique
shadow image
storage management
visual cryptography
gpu
composability
compute unified device architecture
Conferences
Cryptography
CUDA
cyber-physical systems
efficient encryption
encryption
coalesce
graphics processing units
high-performance
high-performance device
high-performance reformulations
Image Processing
improved global memory utilization
Instruction sets
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
Proxy Re-Encryption using MLBC (Modified Lattice Based Cryptography)
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
encrypted message
efficient encryption
secure proxy re-encryption
Re-encryption time
public key encryption
Proxy re-encryption
proxy key generation time
Modified Lattice Based Cryptography
MLBC
minimal trust proxy
maximum key privacy
Cryptography
efficient proxy re-encryption
cyber-physical systems
resilience
Resiliency
composability
pubcrawl
public key cryptography
data privacy
security
biblio
On the Preservation of the Trust by Regression Verification of PLC software for Cyber-Physical Systems of Systems
Submitted by grigby1 on Fri, 06/19/2020 - 11:48am
programmable controllers
Trusted Computing
trust preservation
trust inheritance analysis
system validation
software-driven systems
security of data
Scalability
Resiliency
resilience
regression verification processes
regression analysis
pubcrawl
control engineering computing
Policy-Governed Secure Collaboration
policy-based governance
PLC software
Mechanical systems
manufacturing automation
manufacturing
formal verification
Formal Specification
formal correctness analysis
false trust
cyber-physical systems of systems
cyber-physical systems
biblio
Using Perfect Codes in Relay Aided Networks: A Security Analysis
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
Reliability
passive eavesdropping attacks
perfect codes
PHY-layer security approaches
physical layer operations
proper security mechanism
pubcrawl
radio networks
Receivers
relay aided networks
Relays
nonnegotiable concept
reliable intermediate relays
resilience
Resiliency
security
Security analysis
selected FEC scheme
simulations
system operations
wireless channels
distinct requirements
composability
cooperative communication
CPS
CPS modeling
CPS Security
Cryptography
cyber-physical systems
Decoding
decoding frame error rate
communication environments
error injection
error probability
error statistics
FEC codes.
forward error correction
forward error correction schemes
Hamming codes
human lives
Metrics
biblio
Game theoretic framework for cyber-physical system security incorporating bounded rationality
Submitted by aekwall on Mon, 06/08/2020 - 11:22am
limited computational capacity
theoretically expected outcome
security of data
security
Scalability
rational game playing
rational decision making
pursuit maximum payoff
pubcrawl
Predictive Metrics
Nash Equilibrium
minimax techniques
minimax Nash Equilibrium strategy
behavioural analysis
Industries
Human Factors
Games
game theory
game theoretic security
game theoretic attack-defence decision
defender
decision making process
Decision Making
cyber-physical systems
cyber-physical system security
Bounded Rationality
biblio
Cyber-physical systems security through multi-factor authentication and data analytics
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
Internet of Things
Smart homes
smart cities
secure authentication
Resiliency
resilience
pubcrawl
password
multifactor authentication
Multi-factor authentication
Metrics
authentication
Internet of Everything
Human Factors
Human behavior
event processing
Data Analytics
data analysis
cyber-physical systems security
cyber-physical systems
complex system
authorisation
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »