Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
An efficient KP-ABE scheme for content protection in Information-Centric Networking
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
KP-ABE
fast key generation
FKP-ABE
ICN
indeterminate caches
information-centric networking
internet
Internet traffic
key policy attribute based encryption
fast key decryption
KP-ABE schemes
policy-based governance
pubcrawl
Scalability
self-contained protection
Streaming media
telecommunication traffic
Access Control
fast decryption
encryption
efficient KP-ABE scheme
efficient key-policy ABE
Data Security
Data protection
Cryptography
content protection
computer network security
computer architecture
collaboration
cached contents
cache storage
attribute-based encryption
attribute based encryption
biblio
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
outsourced data
white box cryptography
white-box traceablity
white-box traceable CP-ABE
outsourced data security
original key owner
malicious cloud users
fully secure traceable CP-ABE system
commitment
catch people
access credentials
cloud storage service
Context
Law
fine-grained access control
Cloud Computing
outsourcing
Metrics
composability
pubcrawl
Resiliency
cloud storage
Access Control
encryption
encrypted data
Data Security
Cryptography
authorisation
ciphertext-policy attribute-based encryption
biblio
A Security Model for the Enhancement of Data Privacy in Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
Scalability
user privacy in the cloud
internet acts
cyberspace data
Access Control
security model
data integrity
data confidentiality
privacy protection
Ciphers
Cloud Computing
Metrics
pubcrawl
Resiliency
Organizations
data privacy
encryption
Data Security
Cryptography
biblio
Framework modeling for User privacy in cloud computing
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
privacy framework
user privacy in the cloud
user privacy framework
Trusted Computing
trust issues
security in cloud computing
Scalability
Resiliency
pubcrawl
protection monitor
privacy issues over cloud
Access Control
privacy
Organizations
Metrics
framework modeling
encryption
Data Security
data privacy
Cryptography
Cloud Computing
authorisation
biblio
Toward Instantaneous Sanitization through Disturbance-induced Errors and Recycling Programming over 3D Flash Memory
Submitted by grigby1 on Thu, 07/09/2020 - 1:56pm
Human behavior
three-dimensional integrated circuits
Scalability
sanitization functionalities
sanitization
Resiliency
resilience
recycling programming design
pubcrawl
programming disturbance properties
programming
privacy
NAND circuits
instantaneous data sanitization scheme
Human Factors
3D NAND flash memory chips
flash memory
flash memories
error correction codes
error correction code
encryption techniques
disturbance-induced errors
disturbance overheads
Data Security
data sanitization techniques
Data Sanitization
data deletion
Compositionality
3D NAND flash-memory-based devices
biblio
BcIoT: Blockchain based DDos Prevention Architecture for IoT
Submitted by aekwall on Mon, 06/29/2020 - 1:05pm
Distributed databases
smart things
smart contract security
self-configuring things
IoT technologies
Internet of Thing (IoT)
hash based secret key
DDoS prevention
data consistency
centralized system
BcIoT
DDoS Attack Prevention
DDoS Attack
blockchain technology
contracts
Computer crime
blockchain
Metrics
composability
pubcrawl
Human behavior
Resiliency
computer architecture
data integrity
private key cryptography
Internet of Things
Conferences
data privacy
Data Security
computer network security
biblio
Energy-Adaptive Lightweight Hardware Security Module using Partial Dynamic Reconfiguration for Energy Limited Internet of Things Applications
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
multiple encryption modes
energy limited internet of things applications
energy-adaptive lightweight hardware security module
high power consumption
high security levels
Internet of Things (IoT)
low power consumption
low power IoT applications
low security level
maximum dynamic power dissipation
Encryption Modes
partial dynamic reconfiguration
power 10.08 mW
power budget
power constraint
power-security level trade-off
security level values
security strength
Throughput
composability
Cryptography
encryption
Internet of Things
security
security attacks
Hardware
Data Security
pubcrawl
Ciphers
Metrics
Resiliency
cyber-physical systems
Applicability and Robustness (CAESAR)
Competition for Authenticated Encryption: Security
DPR system
dynamic partial reconfiguration
Dynamic Partial Reconfiguration (DPR)
biblio
A Dual Layer Image Encryption using Polymerase Chain Reaction Amplification and DNA Encryption
Submitted by aekwall on Mon, 06/22/2020 - 11:27am
encoding
unauthorized data access
polymers
polymerase chain reaction amplification
image protection
dual layer image encryption
DNA encryption
digital image security
biological sequences
binary encoding
biocomputing
DNA cryptography
cryptographic algorithms
image encryption
authorisation
Predictive Metrics
digital images
DNA
privacy
Image coding
Data protection
pubcrawl
Human behavior
Resiliency
encryption
Data Security
Cryptography
biblio
A New Approach of Digital Signature Verification based on BioGamal Algorithm
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Communication Network
SHA algorithm
secured digital signature algorithm
secure hash code
secure digital signature
existing PlayGamal algorithm
digital signature verification
BioGamal algorithm
encryption algorithm
sensitive information
security of data
digital signature
verification
digital signatures
Cryptography
pubcrawl
Resiliency
security
Data Security
Scalability
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
…
next ›
last »