Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computational overhead
biblio
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
computational overhead
Security Audits
TPA methods
third party auditing method
Third Party Auditing
systematic review
public auditing
Merkel hash tree method
Merkel hash tree
data integrity checking method
considerable efficiency
computation overhead
communication cost
storage management
security of data
Scalability
Cloud Security
performance evaluation
program verification
Security analysis
privacy
pubcrawl
Human behavior
Resiliency
data integrity
cloud storage
Data Security
Cloud Computing
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
pseudonyms
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
computational overhead
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
security
VANET
public key cryptography
attacks
authentication
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
Cryptography
biblio
A secure data aggregation protocol for fog computing based smart grids
Submitted by aekwall on Mon, 06/24/2019 - 2:00pm
Smart Grid
policy-based governance
privacy
Protocols
pubcrawl
Resiliency
secure data aggregation
Secure Data Aggregation scheme
Security analysis
Servers
performance evaluation results
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
smart power grids
storage efficiency
storage overhead
telecommunication security
transmission overhead
edge computing
Cloud Computing
cloud server
computational overhead
Cryptography
data aggregation
data aggregation process
data privacy
Data Transmission
additive homomorphic encryption consumer privacy
end-to-end confidentiality
FCSG
Fog computing
fog layer
Human behavior
Internet of Things
Metrics
novel Domingo-Ferrer additive privacy
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
biblio
Towards Access Control for Network Coding-Based Named Data Networking
Submitted by grigby1 on Mon, 06/11/2018 - 2:34pm
network coding-based named data networking
linear all-or-nothing transform
linear AONT
matrix algebra
Metrics
Mobile Application
mobile computing
ndnSIM
network coding
internet
network coding-based NDN
pubcrawl
resilience
Resiliency
Security analysis
telecommunication network routing
Transforms
content producer
authorisation
authorization
authorization key
composability
computational overhead
computer network security
content delivery
content delivery effectiveness
Access Control solution
content-oriented future Internet architecture
Cryptography
encoding
encoding matrix
encryption
in-network caching
information-intensive application
biblio
A security aware scheduling in fog computing by hyper heuristic algorithm
Submitted by K_Hooper on Wed, 05/09/2018 - 10:03am
scheduling
Internet of Things
job scheduling
latency
Processor scheduling
pubcrawl
Resiliency
resource allocation
Scalability
integrity parameter
security
security aware scheduling
Security Heuristics
security of data
security overhead
sensor nodes
Task Analysis
data mining technique
authorisation
average energy consumption
Cloud Computing
computational overhead
confidentiality parameter
CPU utilization
data integrity
Data mining
authentication parameter
edge computing
Fog computing
fog devices
heterogeneous distributed environment
heuristic algorithm
Heuristic algorithms
hyper heuristic algorithm
biblio
A Dynamic Searchable Encryption Scheme for Secure Cloud Server Operation Reserving Multi-Keyword Ranked Search
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Secure
outsourcing
pubcrawl
query processing
ranked search
resilience
Resiliency
resource pooling
search problems
multikeyword
secure cloud server operation
Secure File Sharing
secure technique
sensitive data
Servers
TF × IDF model
update
update operation
dynamic
cloud
Cloud Computing
composability
computational overhead
Cryptography
data owners
data privacy
data users
Amazon EC2 cloud server
dynamic operation
dynamic searchable encryption scheme
encryption
Human behavior
Indexes
Metrics
multi-keyword