Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Secure File Sharing
biblio
SIRLC: Secure Information Retrieval using Lightweight Cryptography in HIoT
Submitted by grigby1 on Wed, 03/18/2020 - 12:28pm
pubcrawl
Internet of Things
LiBAC
Light-Weight Cryptography
lightweight break-glass access control
medical information systems
medical records
patient care
patients care
private key cryptography
information retrieval
reduced computational complexity
resilience
Resiliency
secret key generation time
Secure File Sharing
secure information retrieval using lightweight cryptography
SIRLC
therapeutic records
encryption
access permission
attribute based key
Attribute based Key Management
authorisation
authoritative entities
cipher text size
Emergency care
emergency key
emergency supporting representatives
Access Control
enhanced security
ESR
Generators
health care
healthcare Internet of things
HIoT
hospitals
Identity management
biblio
A Hybrid Algorithm for Influence Maximization of Social Networks
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
NP problem
Secure File Sharing
resilience
Resiliency
pubcrawl
wikipedia
voting situation
Time complexity
social networks
social networking (online)
social network
Peer-to-peer computing
optimisation
optimal solution
Big Data
influence maximization
hybrid distribution value accumulation algorithm
Hybrid algorithm
hill climbing
Heuristic algorithms
greedy algorithms
greedy algorithm
Gnutella node-to-node file sharing network
Encyclopedias
dissemination process
dissemination effect
computational complexity
activation effect
biblio
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
data encryption
Data Security
end-to-end data security
NIST statistical test suite
SDEx method
secure communication
secure data exchange method
secure transmission
pubcrawl
Resiliency
resilience
Secure File Sharing
biblio
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
mobile computing
Secure File Sharing
resilience
Resiliency
pubcrawl
user intervention
telecommunication security
size 20.0 cm
short distance file transfer
secure face-to-face device authentication
secure authentication
pairing schemes
Nonlinear distortion
Nhuth
mobile devices
authentication
microphones
message authentication
location-sensitive authentication mechanism
location-based-validation model
Harmonic analysis
face-to-face scenarios
face-to-face device-to-device communication
face-to-face D2D
Device-to-device communication
device legitimacy
device authentication consistency
critical security problem
Acoustics
acoustic nonlinearity patterns
biblio
An Approach for Sending a Confidential Message to the Restricted Users in Defence Based Organization
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
group key
Secure File Sharing
resilience
Resiliency
pubcrawl
user list
untrusted cloud storages
third-party applications
storage node
spammer
security problem
secure platform
profiling users
personal information
group member communication
Group Manager
Cryptography
file transfer
file sharing process
dynamic broadcasting encryption
defense-based organization
defense networks
defense network
defence based organization
decryption
confidential message
storage management
Organizations
Public key
Cloud Computing
Access Control
encryption
biblio
Efficient Group Data Sharing In Cloud Environment Using Honey Encryption
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
group data sharing
Secure File Sharing
resilience
Resiliency
pubcrawl
standards
security
resource sharing
information sharing
honey encryption
Group Manager
Ciphers
efficiency
cloud environment
advanced encryption standard
cloud
resource allocation
Servers
Cloud Computing
encryption
Cryptography
biblio
SecureCSearch: Secure Searching in PDF Over Untrusted Cloud Servers
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
Keyword search
Secure File Sharing
resilience
Resiliency
pubcrawl
untrusted cloud servers
specific files
Shamir's Secret Sharing
Shamir Secret Sharing scheme
SecureCSearch
secure searching
Searching
Portable document format
PDF file
PDF
keyword search operations
Cryptography
information retrieval
incurs minimal computation cost
hacks
encrypted shares
encrypted PDF files
encrypted domain
encrypted cloud data
data leakage
cloud
data storage
storage management
Servers
Cloud Computing
security
encryption
biblio
A Platform for Private and Controlled Spreadsheet Objects Sharing
Submitted by grigby1 on Wed, 03/18/2020 - 12:26pm
groupware
Secure File Sharing
resilience
Resiliency
pubcrawl
tabular data
spreadsheets collaborative authoring applications
Spreadsheets
Spreadsheet programs
spreadsheet objects sharing
spreadsheet file sharing
sensitive data sharing
Secure spreadsheet data sharing
privacy
office automation
Cryptography
Data visualization
data storage
data integrity
data analysis
confidential data exchange
Computer supported collaborative work
collaborative editing
collaborative analytics
business data processing
storage management
Protocols
data privacy
authorisation
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 12:26pm
protected volumes
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
file servers
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
Cloud Computing
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Outsourced Database Integrity
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
biblio
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
decentralized safety administration
Security analysis
Secure File Sharing
Safety
Resiliency
resilience
pubcrawl
Peer-to-peer computing
outsourcing data
outsourcing
Metrics
Human Factors
Human behavior
fine-grained data access control
encryption
Distributed databases
Access Control
Data Security
data integrity
Cryptography
CP-ABE
composability
cloud storage
cloud service provider
cloud server
Cloud Computing
ciphertext-policy attribute based encryption
blockchains
blockchain-based secure cloud file sharing scheme
blockchain technology
blockchain
authorisation
« first
‹ previous
1
2
3
4
5
next ›
last »