Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
A Secure Fog-Cloud Based Architecture for MIoT
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
medical data
Temperature sensors
Software Architecture
security of data
security issues
secure fog-cloud based architecture
Scalability
Resiliency
pubcrawl
Monitoring
MIoT devices
MIoT architectures
MIoT
Medical services
medical Internet of Things
attribute-based encryption
medical computing
medial data
Internet of Things
healthcare services
healthcare providers
Healthcare
health care
Fog Computing and Security
Fog computing
Data Security
computer architecture
Cloud Computing
Biomedical monitoring
biblio
Research on Protection for the Database Security Based on the Cloud of Smart Grid
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
information security
state grid
smart power grids
Smart Grid
sensitive data encryption
security of data
safety protection
Resiliency
pubcrawl
production data desensitization
Predictive Metrics
power engineering computing
Internet market
internet
information security assurance
Big Data
encryption audits
database security audit technology
database management systems
database firewall technology
Data Security
Cryptography
Compositionality
cloud services
cloud security issues
cloud environment
cloud database security protection
cloud database security
Cloud Computing
biblio
Deep En-Route Filtering of Constrained Application Protocol (CoAP) Messages on 6LoWPAN Border Routers
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
6LoWPAN border routers
victim devices
low-power sleep modes
lightweight protocols
IoT device
Denial-of-Sleep Attack
deep en-route filtering
constrained application protocol messages
CoAP server
CoAP messages
Servers
wide area networks
Data Security
6LoWPAN
telecommunication network routing
composability
pubcrawl
Resiliency
Protocols
Internet of Things
biblio
Development Of A Novel Security Scheme Using DNA Biocryptography For Smart Meter Data Communication
Submitted by grigby1 on Tue, 01/07/2020 - 10:52am
electroencephalography
smart meters
smart meter data communication
smart meter communication
Simulink/Matlab
secure communication
Resiliency
resilience
pubcrawl
privacy
Predictive Metrics
Metrics
lightweight encryption scheme
Human behavior
Handheld computers
encryption
2-phase DNA cryptography
DNA cryptography
DNA
Diffie Hellman scheme
DH-EAB key exchange scheme
Data Security
data privacy
data communication
Cryptography
Communications technology
biology computing
Biocryptography
AMI security
AMI communication network
advanced security mechanisms
advanced metering infrastructure
biblio
Double Encryption Using TEA and DNA
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
Ciphers
TEA
secure network communication
passive attacks
Double encryption
data intruders
active attacks
active and passive attacks
decryption time
Resiliency
cryptographic algorithms
DNA
privacy
digital signatures
Data Security
Receivers
Data Transmission
information security
Cryptography
encryption
Metrics
Human behavior
pubcrawl
resilience
biblio
Integration of CPU and GPU to Accelerate RSA Modular Exponentiation Operation
Submitted by grigby1 on Mon, 12/30/2019 - 2:18pm
Mode power operation
tools
stored information
smart phones
security of data
Scalability
RSA modular exponentiation operation
RSA encryption algorithm
RSA
Resiliency
public key cryptography
pubcrawl
personal information
parallel programming
parallel computing
parallel architectures
accelerating RSA algorithm
graphics processing units
graphics process unit
GPU parallel programming
gpu
exponentiation
encryption efficiency
encryption
Data Security
CUDA
CPU
compute unified device architecture
Complexity theory
central process unit
Acceleration
biblio
Achieving Fast Sanitization with Zero Live Data Copy for MLC Flash Memory
Submitted by aekwall on Mon, 12/16/2019 - 1:47pm
multilevel-cell flash memories
zero live-data-copy overhead
zero live data copy
security of data
sanitization
resilience
pubcrawl
programming
privacy
page programming
one-shot sanitization design
Compositionality
MLC flash memory
Micromechanical devices
Media
Human behavior
flash memory
flash memories
fast sanitization scheme
Data Security
Data Sanitization
Cryptography
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
Security and Device Control Method for Fog Computer Using Blockchain
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
blockchain
Data Security
Fog computing
Fog Computing and Security
Hash Function
Internet of Things
composability
Human behavior
Metrics
pubcrawl
Repudiation
resilience
Resiliency
Scalability
biblio
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control
Submitted by grigby1 on Thu, 09/26/2019 - 10:43am
decentralized safety administration
Security analysis
Secure File Sharing
Safety
Resiliency
resilience
pubcrawl
Peer-to-peer computing
outsourcing data
outsourcing
Metrics
Human Factors
Human behavior
fine-grained data access control
encryption
Distributed databases
Access Control
Data Security
data integrity
Cryptography
CP-ABE
composability
cloud storage
cloud service provider
cloud server
Cloud Computing
ciphertext-policy attribute based encryption
blockchains
blockchain-based secure cloud file sharing scheme
blockchain technology
blockchain
authorisation
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »