Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Homomorphic encryption
biblio
Enhanced Homomorphic Encryption Scheme with PSO for Encryption of Cloud Data
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
PSO algorithms
Nature Inspired
metaheuristic algorithms
key organization
key allocation
homomorphic encryption approach
homomorphic encoding scheme
homomorphic algorithm
Homomorphic
encoding technique
encoding procedure
cloud data
resource utilization
homomorphic encryption scheme
Cloud Computing
encoding
Human Factors
cloud server
key management
particle swarm optimization
particle swarm optimisation
Metrics
resource management
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
Distributed Image Encryption Based On a Homomorphic Cryptographic Approach
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
homomorphic encryption function
Scalability
RGB image encryption
Resiliency
red green blue image
pubcrawl
pixel intensity sub-values
Paillier Cryptographic System
original RGB image
Metrics
individually encrypted pixel intensity sub-values
image security problem
image encryption
image colour analysis
Human Factors
associated encrypted images
Homomorphic encryption
highly secure encrypted images
encryption phase
encryption key
encrypted component image
distributed image encryption approach
Distributed Image Encryption
distributed homomorphic image encryption scheme
Cryptography
constituent channel images
cipher-images
channel image
B-channel images
biblio
Research on Privacy Protection with Weak Security Network Coding for Mobile Computing
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
network coding
Wireless fidelity
weak security network coding
telecommunication security
telecommunication network reliability
Servers
sensors
routing policy
Resiliency
resilience
pubcrawl
privacy protection
composability
mobile sensor networks
mobile computing
Metrics
information transmission process
information transfer mechanism
Homomorphic encryption
encryption
encoding
cyber physical systems
Cryptography
crowd sensing
biblio
Authenticated Network Coding for Software-Defined Named Data Networking
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
Switches
Software-Defined named Data Networking
MIP problem
Internet architecture
homomorphic signature scheme
cooperative network coding mechanism
authenticated network coding
cyber physical systems
cache storage
network coding
Homomorphic encryption
encoding
Predictive Metrics
security of data
named data networking
cooperative communication
digital signatures
internet
optimization
Routing
composability
pubcrawl
Resiliency
software defined networking
security
biblio
Scalable Distributed Random Number Generation Based on Homomorphic Encryption
Submitted by aekwall on Mon, 03/16/2020 - 10:40am
Metrics
verifiable random functions
verifiable random function
scalable verification
scalable distributed random number generation
Scalability
Resiliency
random number generation
random key generation
random beacons
publicly-verifiable randomness
public key cryptography
pubcrawl
Predictive Metrics
blockchain based applications
mathematical operations
Human behavior
Homomorphic encryption
encrypted data
elliptic curve multiplications
Elliptic curve cryptography
distributed network
distributed ledgers
decentralized schemes
Cryptographic Protocols
Compositionality
blockchain context
biblio
Self-Healing Anonymous Routing in Unstable Sensor Networks
Submitted by grigby1 on Mon, 02/17/2020 - 5:11pm
anonymous routing
composability
Homomorphic encryption
limited deanonymization
pubcrawl
resilience
Resiliency
security
self-healing networks
sensor networks
biblio
Secure Equality Testing Protocols in the Two-Party Setting
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
composability
Cyber Physical System
cyber physical systems
efficiency
efficient encryption
equality test
Homomorphic encryption
privacy
Processing encrypted data
pubcrawl
resilience
Resiliency
biblio
Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements
Submitted by aekwall on Mon, 12/30/2019 - 12:36pm
Homomorphic encryption
TFHE library
OpenMP
multiprocessing enhancements
multiplication operation
MPI
latency reduction
Boolean Circuit
arithmetic operations
arithmetic circuit homomorphic encryption
Arithmetic Algorithm
arithmetic
adders
Informatics
Cloud Computing
multiprocessing systems
Registers
Human Factors
cloud services
Logic gates
Libraries
Metrics
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
Improvement in Homomorphic Encryption Algorithm with Elliptic Curve Cryptography and OTP Technique
Submitted by aekwall on Mon, 12/30/2019 - 12:35pm
Human Factors
OTP technique
OTP
one time password
homomorphic encryption algorithm
encryption keys
Diffie Hellman key exchange algorithm
customary outsider evaluator
fully homomorphic encryption
Homomorphic encryption
distributed computing
Cloud Computing
Transform coding
Elliptic curve cryptography
public key cryptography
Metrics
pubcrawl
Resiliency
Memory management
encryption
Servers
Scalability
biblio
Secure Kalman Filter State Estimation by Partially Homomorphic Encryption
Submitted by aekwall on Mon, 12/30/2019 - 12:35pm
secure estimation
Kalman filters
key system information
modified decryption algorithm
multiplicative homomorphic encryption scheme
normal Kalman filtering
partially homomorphic encryption
power system
quantization
IEEE 9-bus power system
secure Kalman filter state estimation
secure multiparty computation methods
SEKF
state estimates
system parameters
system state
trustworthy situation awareness
Scalability
Communication Network
associated communication channels
Homomorphic encryption
state estimation
Human Factors
sensors
Smart Grids
Metrics
pubcrawl
Resiliency
cyber-physical systems
security
data privacy
encryption
Cryptography
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »