Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security strength
biblio
Improving the Security Strength of Iseki’s Fully Homomorphic Encryption
Submitted by aekwall on Mon, 02/01/2021 - 10:36am
finite element analysis
security strength
secure computation scheme
Iseki fully homomorphic encryption
Reliability engineering
outsourcing
Secure computation
Homomorphic encryption
C languages
Human Factors
Scalability
fully homomorphic encryption
Metrics
pubcrawl
Resiliency
cyber security
encryption
encrypted data
Cryptography
biblio
Energy-Adaptive Lightweight Hardware Security Module using Partial Dynamic Reconfiguration for Energy Limited Internet of Things Applications
Submitted by grigby1 on Fri, 06/26/2020 - 12:17pm
multiple encryption modes
energy limited internet of things applications
energy-adaptive lightweight hardware security module
high power consumption
high security levels
Internet of Things (IoT)
low power consumption
low power IoT applications
low security level
maximum dynamic power dissipation
Encryption Modes
partial dynamic reconfiguration
power 10.08 mW
power budget
power constraint
power-security level trade-off
security level values
security strength
Throughput
composability
Cryptography
encryption
Internet of Things
security
security attacks
Hardware
Data Security
pubcrawl
Ciphers
Metrics
Resiliency
cyber-physical systems
Applicability and Robustness (CAESAR)
Competition for Authenticated Encryption: Security
DPR system
dynamic partial reconfiguration
Dynamic Partial Reconfiguration (DPR)
biblio
Security-based service broker policy for FOG computing environment
Submitted by grigby1 on Fri, 10/26/2018 - 3:46pm
optimal datacenter
Trust models
Time factors
Service Broker
security-based service broker policy
security strength
security risks
security of data
security
Scalability
SbSBP
resource allocation
Resiliency
quantized security
pubcrawl
personal computers
available service providers
online Internet of Things services
load balancing
Internet of Things
Indexes
Heuristic algorithms
FOG computing environment
Fog computing
enhanced heterogeneity
edge computing
decision-making process
Decision Making
computing servers
computer centres
Computational modeling
Cloud Computing
biblio
Securing digital identities in the cloud by selecting an apposite Federated Identity Management from SAML, OAuth and OpenID Connect
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Scalability
OIDC
open authentication
openid connect
open systems
Protocols
pubcrawl
Resiliency
risk management
SAML
OAuth
security assertion markup language
security strength
security vulnerability
Servers
Software Architecture
SSO
standards
technical security measure
XSS
federated identity management
authentication
authorisation
authorization
Cloud Computing
cloud environment
computer systems access
Data protection
digital identities security
DoS
architectural design
FIdM
FIdM standard
Human behavior
Identity management
IT infrastructure
legal security measure
Markup languages
message authentication
MITM