Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
White Box Encryption
biblio
5Gen-C: Multi-Input Functional Encryption and Program Obfuscation for Arithmetic Circuits
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
composability
Metrics
multi-input functional encryption
multilinear maps
program obfuscation
pubcrawl
resilience
Resiliency
White Box Encryption
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
Enhanced Operating System Protection to Support Digital Forensic Investigations
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
operating systems (computers)
forensic-friendly OS design
Forensics
fully homomorphic encryption
Metrics
obfuscation
operating system extensions
operating system protection
operating systems
Forensic software
OS tamper-resistance
pubcrawl
resilience
Resiliency
security
system data recovery
White Box Encryption
white-box cryptography
Cryptography
CEF
Ciphers
component encryption
composability
computer systems
computing on encrypted data
computing with encrypted functions
criminal activity footprints
CED
data integrity
data provenance
data veracity
digital forensic investigations
Digital Forensics
encryption
evidence collection
biblio
Vehicle Network Security Testing
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
testing
Patterns
Payloads
Protocols
pubcrawl
resilience
Resiliency
security
security loophole
pattern decoding
V2V
V2V V2X loopholes
V2X
vehicle
vehicle network security testing
vehicular ad hoc networks
white box approach
White Box Encryption
gateway module security testing
black box approach
CAN
Communication networks
composability
computer network security
diagnostics security
ECU
Ethernet
authentication
gateway security
grey box approach
in-vehicle network security implementation
in-vehicle networks
internetworking
message authentication
Metrics
Network