Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AES encryption
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 9:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures
biblio
Secure Proof of Retrievability System in Cloud for Data Integrity
Submitted by grigby1 on Mon, 08/05/2019 - 10:30am
security model
Generators
integrity verification
Metrics
proof of retrievability
pubcrawl
resilience
Resiliency
retrievability system
file upload phase
security of data
Servers
SHA-S12
storage management
tag generation
third party auditor
Third Party Auditor (TPA)
AES encryption
encryption audits
encryption
Databases
data storage
data integrity
Cryptography
computational cost
Compositionality
Cloud storage (CST)
cloud service controller
Cloud Controller (CSC)
Cloud Computing
Cloud Auditing
Ciphers
Application software
biblio
Secured and Reliable File Sharing System with De-Duplication Using Erasure Correction Code
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Reliability
file-level deduplication system
file sharing system
File systems
Human behavior
Metrics
optimized storage
Peer-to-peer computing
pubcrawl
Reed Solomon Code
error correction codes
resilience
Resiliency
RSA encryption
Secure File Sharing
Secure storage
Servers
storage management
storage space
video files
Cryptography
authorized storage
Ciphers
cipher texts
Cloud Computing
cloud providers
cloud service subscriber
cloud storage servers
composability
computer network reliability
AES encryption
data deduplication technique
data encryption
data owners
de-duplication
encrypted file reliability
encrypted files
encryption
erasure correcting code
erasure correction code