Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Homomorphic encryption
biblio
ZeeStar: Private Smart Contracts by Homomorphic Encryption and Zero-knowledge Proofs
Submitted by grigby1 on Thu, 07/20/2023 - 4:16pm
ethereum
zero-knowledge proofs
Programming Language
compilation
Homomorphic encryption
blockchains
Costs
annotations
Resiliency
expert systems
blockchain
smart contracts
encoding
data privacy
privacy
Scalability
resilience
Human behavior
pubcrawl
biblio
The Fast Paillier Decryption with Montgomery Modular Multiplication Based on OpenMP
Submitted by grigby1 on Tue, 07/18/2023 - 3:23pm
OpenMP
parallel architectures
Montgomery modular multiplication
exponentiation
Paillier
Human Factors
Homomorphic encryption
Resiliency
Chinese remainder theorem
pubcrawl
Distributed databases
Data Security
Artificial Intelligence
programming
data privacy
Scalability
resilience
biblio
An Efficient Approach to Reduce the Encryption and Decryption Time Based on the Concept of Unique Values
Submitted by grigby1 on Thu, 07/13/2023 - 12:46pm
encryption
privacy
Computer hacking
pubcrawl
resilience
Resiliency
Companies
composability
Elliptic curve cryptography
data analysis
Technological innovation
Informatics
Homomorphic encryption
efficient encryption
hybrid encryption
uniqueness of values
biblio
Data Confirmation Scheme based on Auditable CP-ABE
Submitted by grigby1 on Fri, 05/19/2023 - 2:06pm
pubcrawl
policy-based governance
collaboration
Scalability
data privacy
CP-ABE
social computing
blockchains
Homomorphic encryption
data confirmation
paillier homomorphic encryption
biblio
Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Submitted by grigby1 on Fri, 03/31/2023 - 11:25am
biometric encryption
pubcrawl
biometric identification
biometric information protection
computational workload reduction
Costs
Cryptography
dimensionality reduction
face recognition
Forensics
Hardware
Homomorphic encryption
Metrics
Quantization (signal)
resilience
Resiliency
biblio
A Quantum-Resistant Face Template Protection Scheme using Kyber and Saber Public Key Encryption Algorithms
Submitted by grigby1 on Fri, 03/31/2023 - 11:24am
NIST
standardization
Saber
Resiliency
resilience
quantum computing
Public key
privacy
PostQuantum Cryptography
biometric encryption
Metrics
Lattices
Kyber
Homomorphic encryption
face recognition
biometric template protection
pubcrawl
biblio
Securing Biometric Data with Optimized Share Creation and Visual Cryptography Technique
Submitted by grigby1 on Fri, 03/31/2023 - 11:23am
biometric encryption
pubcrawl
Aerospace electronics
Biological system modeling
biometrics
biometrics (access control)
encryption
Homomorphic encryption
Metrics
Optimal key generation
resilience
Resiliency
security
Share creation
visual databases
visualization
biblio
Secret Numerical Interval Decision Protocol for Protecting Private Information and Its Application
Submitted by grigby1 on Fri, 02/17/2023 - 5:20pm
privacy protection
Scientific Computing Security
secret comparison
numerical range
Morton code
Asia
Homomorphic encryption
scientific computing
Compositionality
information security
Decision Making
Protocols
privacy
Resiliency
resilience
Metrics
pubcrawl
machine learning algorithms
biblio
Privacy-Preserving Data Falsification Detection in Smart Grids using Elliptic Curve Cryptography and Homomorphic Encryption
Submitted by grigby1 on Fri, 01/20/2023 - 5:03pm
Servers
pubcrawl
Metrics
Resiliency
data privacy
smart meters
Smart Grids
Elliptic curve cryptography
Bilinear Pairing
Power demand
Homomorphic encryption
Power industry
Smart Grid Privacy
biblio
Efficient Public Verification of Confidential Supply-Chain Transactions
Submitted by grigby1 on Thu, 01/05/2023 - 2:28pm
pubcrawl
resilience
Resiliency
Protocols
Production
network security
secret sharing
Sociology
supply chains
Homomorphic encryption
distributed ledger
Pressing
supply chain security
Distributed Ledger Technology
Proxy re-encryption
supply-chain verification
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »