Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure data sharing
biblio
A Survey on Secured Data Sharing Using Ciphertext Policy Attribute Based Encryption in Cloud
Submitted by grigby1 on Tue, 04/19/2022 - 3:42pm
abe
Cloud Computing
CP-ABE
data privacy
encryption
face recognition
Fingerprint recognition
information management
KP-ABE
policy-based governance
process control
pubcrawl
Scalability
secure data sharing
biblio
A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
trusted third party
resilience
Resiliency
composability
pubcrawl
weak trust
verification
verifiable multiuser searchable encryption schemes
verifiable dynamic multiuser searchable encryption scheme
user search permissions
user permission
user access permission matrices
Cryptography
secure data sharing
multiuser settings
multiuser searchable encryption schemes
dynamic management
Multi-user
encrypted data
searchable encryption
public key cryptography
cloud server
Cloud Computing
authorisation
biblio
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
Submitted by grigby1 on Tue, 01/07/2020 - 9:54am
encrypted files
secure data sharing
Resiliency
resilience
re-encryption keys
Public key
pubcrawl
Proxy re-encryption
protecting sensitive files
key-aggregate proxy re-encryption scheme
Key-Aggregate Cryptosystem
key-aggregate approach
encryption
Access Control
efficient key-aggregate proxy re-encryption
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
conditional proxy re-encryption schemes
computer science
composability
cloud servers
Cloud Computing
authorisation
biblio
CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 9:43am
resilience
Peer-to-peer computing
Proxy Reencryption
pubcrawl
Public key
public key cryptography
quantum computing
quantum computing algorithms
random oracle model
random processes
Metrics
Resiliency
ring-lwe
robust file storage capability
search problem
search problems
secure data sharing
Secure File Sharing
secure file sharing scheme
security issues
decryption time
chosen ciphertext secure
Cloud Computing
cloud storage security
cloud storage service
Collaborative Work
composability
computing technologies
confidentiality
CSS
CCA secure proxy re-encryption scheme
encrypted files
encryption
groupware
Human behavior
Human Factors
lattice based cryptography
Lattices
malicious insiders
biblio
An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
Scalability
fine-grained access control
Inner-product encryption
Proxy re-encryption
secure data sharing
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
biblio
Secure Information Sharing among Autonomous Vehicles in NDN
Submitted by grigby1 on Fri, 02/02/2018 - 12:20pm
named data networking
wireless environment
vehicular data authentication
vehicular ad hoc networks
vehicle tracking
vehicle names
telecommunication security
security
secure information sharing
secure data sharing
robust decisions
Resiliency
Raspberry Pi
pubcrawl
pseudonym scheme
NDN
Accidents
Mobile communication
mobile ad-hoc environment
Metrics
IP networks
Internet of Vehicles
Internet architecture
internet
Human Factors
Human behavior
Data Security
Data models
data delivery
cyber physical systems
autonomous vehicular network
autonomous vehicles