Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
A Monitoring Framework for Side-Channel Information Leaks
Submitted by grigby1 on Mon, 03/15/2021 - 1:10pm
monitor ambient light
side-channel sources
side-channel research
side-channel information leaks
side-channel detection
sensitive information
Resiliency
resilience
recent computer security research
pubcrawl
program security requirements
private information
privacy
popular memory safety
penetration testing tools
monitoring framework
classical exploitation techniques
Metrics
memory corruption
learning (artificial intelligence)
known design patterns
injection tools
indirect means
exploitation framework
data privacy
Cryptography
computer systems
computer network security
Computer Engineering
composability
command injection attacks
biblio
CrypTFlow: Secure TensorFlow Inference
Submitted by aekwall on Mon, 03/15/2021 - 12:11pm
compiler security
TensorFlow inference code
semihonest security
semihonest MPC protocol
Secure TensorFlow inference
secure multiparty computation protocols
Porthos
plaintext TensorFlow
malicious security
malicious secure MPC protocols
inference accuracy
improved semihonest 3-party protocol
ImageNet dataset
end-to-end compiler
CrypTFlow
Aramis
Scalability
program compilers
Compositionality
inference mechanisms
Benchmark testing
public key cryptography
Logistics
Metrics
Cryptography
pubcrawl
Resiliency
Task Analysis
Protocols
Cryptographic Protocols
Hardware
data privacy
biblio
Establishing Authenticity for DICOM images using ECC algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 3:05pm
medical image processing
telemedicine
tampered data
signature verification
security
Scalability
Resiliency
resilience
pubcrawl
privacy
patient records
MRI brain images
Metrics
Medical services
medical related image files
medical information systems
authenticity
medical image files
Medical diagnostic imaging
magnetic resonance imaging
image watermarking
Human behavior
Electronic Medical Records (EMR)
ECDSA algorithm
ECDSA
ECC algorithm
digital signatures
DICOM images
DICOM
data privacy
BIOS
biomedical MRI
biblio
Security Issues Seclusion in Bitcoin System
Submitted by grigby1 on Tue, 03/09/2021 - 2:49pm
Human behavior
User profile
user identity
transaction verification
transaction processing
transaction management
trading
security issues
security
Scalability
pubcrawl
pseudonames
peer-to-peer payment network
Peer-to-peer computing
market
adversarial attacks
exchange trading commodity
exchange
digital currency
data privacy
cryptocurrency
cryptocurrencies
crypto-currency
blockchain
Bitcoin system
Bitcoin privacy
bitcoin
assets
Anonymity and Privacy
biblio
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
LN community
wormhole attack
sensitive payment information
security vulnerabilities
security
Scalability
Receivers
quantitative analysis
pubcrawl
privacy
permissionless decentralized cryptocurrencies
payment channel networks
network-wide DoS attack costs
multihop payment protocols
anonymity
Lightning Network
Lightning
Human behavior
denial-of-service attacks
data privacy
Cryptographic Protocols
cryptocurrencies
contracts
concurrent payments
computer network security
channel capacity
bitcoin
anonymity issues
biblio
Software architecture for the application of facial recognition techniques through IoT devices
Submitted by aekwall on Tue, 03/09/2021 - 11:58am
neural network
Transportation
Systematics
Software measurement
software architecture proposal
Software Architecture
Software
security of data
Scalability
Resiliency
pubcrawl
process control
personal data
biometric encryption
Metrics
IoT devices
Internet of Things
feature extraction
facial recognition time
facial recognition techniques
facial recognition
face recognition
encryption
data privacy
biometrics (access control)
Big Data
biblio
Individualization of Anonymous Identities Using Artificial Intelligence (AI)
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
data privacy
unique identity
stereo image processing
standards
specific personal characteristics
Scalability
Resiliency
Reliability
Regulation
pubcrawl
Metrics
individualization
identity anonymization
Human-computer interaction
human body measures
Fingerprint recognition
biometric encryption
Cryptography
COVID-19
computer vision
communication
but still anonymous
blockchain
biometrics (access control)
biometric identity
biometric footprint
authorisation
Artificial Intelligence (AI)
Artificial Intelligence
anonymous identity
anonymous identities
additional personal information being
biblio
A Decentralized, Privacy-preserving and Crowdsourcing-based Approach to Medical Research
Submitted by grigby1 on Thu, 03/04/2021 - 3:06pm
medical computing
ZK-SNARK
zero-knowledge proof
zero trust
zero knowledge argument of knowledge
verifiable computation
Trusted Computing
smart contracts
Scalability
Resiliency
resilience
pubcrawl
privacy
policy-based governance
mutual trust
medical research
blockchain
machine learning
Human Factors
health data privacy
faces
distributed processing
Distributed databases
decentralized platform
data privacy
cybernetics
Cryptography
crowdsourcing platform
crowdsourcing
commitment schemes
commit-and-prove
blockchains
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Protocols
zero-knowledge proof
zero trust
UTXO unconsumed model
transaction processing
smart contract address information
smart contract
self-certification
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
anonymous improvement scheme
privacy leakage
privacy
policy-based governance
Human Factors
Elliptic curves
data privacy
cryptocurrencies
contracts
blockchain atomic swap
atomic exchange
anonymous scheme
anonymous list
« first
‹ previous
…
23
24
25
26
27
28
29
30
31
…
next ›
last »