Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
provable security
biblio
Updatable Block-Level Message-Locked Encryption
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
composability
Compositionality
incremental cryptography
Merkle-hash tree
message-locked encryption
Metrics
provable security
pubcrawl
random oracle model
resilience
Resiliency
biblio
Why Your Encrypted Database Is Not Secure
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
composability
Compositionality
Metrics
provable security
pubcrawl
resilience
Resiliency
biblio
Privacy Preserving Two-Server Diffie-Hellman Key Exchange Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
composability
Compositionality
Metrics
privacy-preserving protocols
provable security
pubcrawl
resilience
Resiliency
security and privacy
security services
biblio
On the Security of a Provably Secure Certificateless Strong Designated Verifier Signature Scheme Based on Bilinear Pairings
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
certificateless
composability
Compositionality
cryptanalysis
digital signature
digital signatures
Metrics
provable security
pubcrawl
resilience
Resiliency
signer ambiguity
strong designated verifier
biblio
Security of Okamoto Identification Scheme: A Defense Against Ephemeral Key Leakage and Setup
Submitted by grigby1 on Thu, 05/24/2018 - 12:19pm
composability
Compositionality
ephemeral random values
GDH
Identification
impersonation
leakage
Metrics
Okamoto scheme
provable security
pubcrawl
resilience
Resiliency
security reduction
simulatability
biblio
A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing
Submitted by grigby1 on Thu, 05/24/2018 - 12:18pm
Access Control
composability
Compositionality
Control Theory
fault tolerance
information sharing
Metrics
ORCON
provable security
pubcrawl
resilience
Resiliency
security
biblio
One-Message Unilateral Entity Authentication Schemes
Submitted by grigby1 on Thu, 05/24/2018 - 12:18pm
Authentication schemes
composability
Compositionality
Metrics
one-time password
provable security
pubcrawl
resilience
Resiliency
biblio
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Metrics
worst-case communication cost
wireless sensor networks
untrusted cloud server query
sensors
Sensor-Cloud
security
Resiliency
resilience
Query-Anonymity
query receiver-anonymity
query processing
pubcrawl
privacy
network diameter
provable security
Internet of Things security
Internet of Things
Human behavior
Games
data privacy
cyber-physical systems
composability
communication-cost
cloud-based IoT system
cloud services
Cloud Computing
authorisation
anonymity
biblio
Provable security analysis of complex or smart computer systems in the smart grid
Submitted by grigby1 on Wed, 02/21/2018 - 1:50pm
smart computer systems
power engineering computing
power system security
provable security analysis
pubcrawl
Radiation detectors
resilience
Resiliency
Scalability
security of data
simple promela interpreter
Ports (Computers)
Smart Grid
smart grid security
smart power grids
smart system
SPIN
Temporal Logic
temporal logics
Transition System
TS
Formal Specification
access control mechanism
ACM
authorisation
automata
automata theory
Büchi Automaton
computer security
formal security
formal security analysis
provable security
formal verification
FSA
Linear Temporal Logics
LTL
Mathematical model
Metrics
model checking
operating system
OS
biblio
Encrypted computing: Speed, security and provable obfuscation against insiders
Submitted by grigby1 on Wed, 01/10/2018 - 12:18pm
coding theory
compiler security
composability
encryption
Hardware
Pipelines
provable security
pubcrawl
Random access memory
Registers
Resiliency
security
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »