Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
provable security
biblio
Authorization of Searchable CP-ABE Scheme with Attribute Revocation in Cloud Computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
data user
user attribute
Servers
searchable CP-ABE scheme
searchable attribute-based encryption schemes
Scalability
revocation stage
Public key
pubcrawl
provable security
policy-based governance
multi-keyword search
encryption
attribute revocation
data privacy
Cryptography
CP-ABE
collaboration
cloud service provider
cloud computing environment
Cloud Computing
ciphertext information
authorization server
authorization information
authorization
authorisation
biblio
ID-based Strong Designated Verifier Signature Scheme and its Applications in Internet of Things
Submitted by aekwall on Mon, 06/22/2020 - 11:26am
cloud
ROM
produced signature
issued signature
Intenet of Things
ID-based strong designated verifier signature scheme
ID-based signature scheme
Electrical Engineering
Designated verifier signature
designated verifier
BDH
random oracle model
Cloud Computing
sensors
Bilinear Pairing
Smart Home
Public key
digital signatures
pubcrawl
Resiliency
provable security
Internet of Things
digital signature
Scalability
biblio
Resolving the Trilemma in Logic Encryption
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
post SAT approaches
trilemma
traditional logic encryption algorithms
structural security
SAT attack
Resiliency
resilience
query complexity
pubcrawl
provable security
provable logic obfuscation
pre-SAT approaches
Compositionality
Metrics
logic resynthesis
logic design
logic circuits
locking robustness
locked circuit
hardware ip protection
error number
encryption efficiency
Cryptography
computability
biblio
A Critical Evaluation of the Paradigm Shift in the Design of Logic Encryption Algorithms
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
structural corruption
SAT attack
paradigm shift
modern logic encryption algorithms
low-cost countermeasures
logic encryption techniques
logic encryption
intellectual property piracy
integrated circuit supply chain
Hardware Trojans
computability
Boolean satisfiability attack
resilience
Logic gates
Compositionality
Metrics
invasive software
Computer crime
integrated circuits
industrial property
Hardware Security
Hardware
Resiliency
pubcrawl
encryption
Cryptography
biblio
Code-based Pseudorandom Generator for the Post-Quantum Period
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
“Provable”
resilience
security model
Resistance
Random sequences
Periodic Properties
Fischer-Stern Generator
Cryptographically Resistance Pseudorandom Sequences
Code-based Pseudorandom Number Generator
pubcrawl
provable security
Compositionality
Decoding
Metrics
Prototypes
Cryptography
Generators
Resiliency
biblio
Membership Inference Attacks Against Adversarially Robust Deep Learning Models
Submitted by grigby1 on Fri, 04/03/2020 - 12:56pm
provable security
resilience
Training data
target model
security and privacy
provable defense
privacy challenges
membership inference attack
evasion attacks
empirical membership inference attacks
adversarially robust deep learning models
adversarial training method
adversarial defenses
adversarial defense methods
adversarial defense
deep learning
Compositionality
Metrics
neural nets
security challenges
privacy
Data models
data privacy
Resiliency
pubcrawl
security
Predictive models
Training
security of data
learning (artificial intelligence)
biblio
A Formal Approach to Secure Speculation
Submitted by grigby1 on Fri, 04/03/2020 - 12:55pm
SMT
meltdown
microarchitectural side-channels
mitigation
observational-determinism
out-of-order-execution
safety-property
secure speculation property
secure speculative execution
side-channel
information-flow
software mitigations
Spectre
speculation
trace property-dependent observational determinism
trace-property
transient execution attacks
transient-execution
uclid5
resilience
formal verification
security
pubcrawl
Resiliency
verification
microarchitecture
Program processors
Transient analysis
Linux
Kernel
security of data
Metrics
Compositionality
provable security
formal
formal approach
Formal-Verification
hyperproperty
information flow security properties
biblio
Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme
Submitted by grigby1 on Fri, 04/03/2020 - 12:55pm
cryptographic hash functions
resilience
wireless sensors
sequential aggregate MAC
sequential aggregate authentication
provable security
Ma-Tsudik FssAgg MAC scheme
Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme
forward security
Cryptography
Cryptographic Hash Function
access protocols
Compositionality
Metrics
wireless sensor networks
Resiliency
pubcrawl
biblio
Increasing the SAT Attack Resiliency of In-Cone Logic Locking
Submitted by grigby1 on Wed, 02/26/2020 - 4:48pm
Logic gates
security
satisfiability attack
SAT attack resiliency
SAT attack
Resiliency
resilience
removal attack
pubcrawl
MFFC based algorithm
maximum fanout free cones
manufacturing
logic locking
provable security
logic design
key gate selection
Iterative methods
integrated logic circuits
integrated circuits
in-cone techniques
in-cone logic locking
Hardware Security
Hardware
Electronics packaging
circuit netlist
biblio
FairSwap: How To Fairly Exchange Digital Goods
Submitted by grigby1 on Thu, 09/26/2019 - 10:42am
blockchain based protocols
composability
distributed file sharing
fair exchange
fairness
Human behavior
Human Factors
Metrics
provable security
pubcrawl
resilience
Resiliency
Secure File Sharing
smart contracts
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »