Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption scheme
biblio
Chaotic Constellation Scrambling Method for Security-Enhanced CO-OFDM/OQAM Systems
Submitted by aekwall on Mon, 01/18/2021 - 10:22am
communication system
security-enhanced CO-OFDM-OQAM systems
security-enhanced
offset quadrature amplitude modulation
encryption project
encryption methods
coherent optical OFDM/OQAM
coherent optical OFDM-OQAM system
chaotic cross mapping
chaotic constellation scrambling method
chaotic constellation scrambling (CCS)
BER
OFDM modulation
Scalability
optical communication
encryption scheme
transmitted information
quadrature amplitude modulation
chaotic encryption
chaotic cryptography
error statistics
Bit error rate
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
Submitted by grigby1 on Fri, 07/24/2020 - 11:51am
multiauthority CP-ABE scheme
cryptographic applications
cryptographic technology
data confidentiality
flexible threshold access policy
generic lattice
ideal lattice
Multi-authority
multiauthority ciphertext policy
Ciphertext policy attribute-based encryption
multiple attribute authorities
post-quantum era
quantum attacks
R-LWE
ring learning with errors
virtual attributes
collaboration
Cryptography
bilinear maps
fine-grained access control
Resists
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption scheme
CP-ABE
Lattices
policy-based governance
pubcrawl
Cloud Computing
Scalability
data privacy
authorisation
Access Control
encryption
biblio
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 11:49am
single cloud environment
cloud storage service
CP-ABE algorithm
multi-cloud
multicloud architecture
multicloud CP-ABE
privacy leakage
Privacy-preserving
privacy-preserving CP-ABE access control scheme
share data
cloud storage environment
single cloud scheme
single-cloud CP-ABE
suitable security access control technology
user attribute set
user collusion attack
user data
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
collaboration
pubcrawl
encryption
Access Control
authorisation
Cloud Computing
data privacy
Servers
Scalability
storage management
privacy
Cryptography
policy-based governance
CP-ABE
encryption scheme
access control overhead
access policy tree
achieving privacy-preserving CP-ABE access control
ciphertext-policy
cloud storage
biblio
Revocable Sliced CipherText Policy Attribute Based Encryption Scheme in Cloud Computing
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
Resiliency
encryption scheme
entrusted cloud servers
fine-grained access control model
flexible access control model
Human behavior
individual industries
Metrics
outsourcing
policy-based governance
pubcrawl
resilience
encryption
revocable sliced ciphertext policy attribute
revocation
revocation limitations
Scalability
scalable access control model
sensitive data outsourcing
Servers
single slice
sliced revocable solution
splitting algorithm
symmetric encryption
cost-efficient service
Asymmetric Encryption
attribute-based encryption
authorisation
CipherText Policy Attribute Based Encryption
Cloud access control
Cloud Computing
cloud migration
composability
Compositionality
computational cost
Computational modeling
advanced encryption standard
CP-ABE
critical task
Cryptography
cyber-physical systems
data access security
data integrity
data owner overhead
data privacy
data size
efficient cryptographic technique
efficient encryption
biblio
Fully homomorphic encryption scheme on a nonCommutative ring R
Submitted by aekwall on Mon, 06/08/2020 - 10:35am
fully homomorphic encryption scheme
Scalability
Resiliency
pubcrawl
noncommutative ring
Non commutative ring
Metrics
Large scale integration
Human Factors
Homomorphic encryption
Cloud Computing
Fully homomorphic cryptosystems
encryption scheme
encryption
Elliptic curves
Elliptic curve cryptography
Cryptography
conjugate problem
conjugate gradient methods
Conjugal problem
biblio
Protecting Messages Using Selective Encryption Based ESI Scheme for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
Selective Encryption
wired networks
reasons MANET
protecting messages
misbehaving node
ESI scheme
encryption scheme
dynamic topology
centralized administrator
ample protection
MANET security
mobile nodes
message passing
telecommunication security
security scheme
Compositionality
mobile ad hoc network
telecommunication network topology
mobile ad hoc networks
MANET
Metrics
Routing protocols
pubcrawl
Resiliency
Cryptographic Protocols
biblio
Reliable Data Sharing Using Revocable-Storage Identity-Based Encryption in Cloud Storage
Submitted by grigby1 on Mon, 03/19/2018 - 12:36pm
Identity-based encryption
storage management
shared data
security
secure file sharing system
Secure File Sharing
revocation
revocable-storage identity
Resiliency
resilience
reliable data sharing
Receivers
pubcrawl
Metrics
authorisation
Human behavior
encryption scheme
encryption
efficient revocation scheme
data sharing
Cryptography
cryptographically enhanced access control
composability
cloud storage
cloud server
Cloud Computing
authorization