Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encrypted data
biblio
Research on Sensitivity Audit Scheme of Encrypted Data in Power Business
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Predictive Metrics
informatization construction
known plaintext attacks
plaintext attacks
power business data sensitivity
power engineering computing
Power industry
power production
power system economics
power system security
Frequency measurement
pubcrawl
security demonstration
sensitive data audit
Sensitivity
sensitivity audit scheme
Standard Network Data Security System
standards
transparent encryption
Weight measurement
Data protection
Scalability
Resiliency
Human behavior
Business
ciphertext data
Compositionality
Cryptography
data information
Data models
Security Audits
data resource
Data Security
data security protection
data storage
decryption key
Electricity supply industry
encrypted data
encryption
encryption audits
biblio
Sparser: Secure Nearest Neighbor Search with Space-filling Curves
Submitted by aekwall on Mon, 02/22/2021 - 1:45pm
nearest neighbor search
strengthening privacy
Sparser pre-processes plaintext data
space-filling perturbation
Space-filling curve
secure nearest neighbor search
perturbation
nearest neighbor queries
logarithmic time
approximate nearest neighbors
approximate nearest neighbor search solution
order-preserving encryption
Cryptography
space-filling curves
approximation theory
Predictive Metrics
Curve fitting
Measurement
query processing
pubcrawl
nearest neighbour methods
data privacy
encrypted data
biblio
Fast and Secure kNN Query Processing in Cloud Computing
Submitted by aekwall on Mon, 02/22/2021 - 1:44pm
RBF
untrusted cloud
tracking technology
secure range query protocol
secure location-based query
secure index
random Bloom filter
process location-based queries
LSPs
geospatial data storage
FSkNN
fast location-based query
fast and secure kNN query processing
data structure
commercial public clouds
Geospatial analysis
Cloud Computing
nearest neighbor search
location based services
location-based services
Predictive Metrics
Indexes
Measurement
data structures
query processing
pubcrawl
nearest neighbour methods
Protocols
data privacy
encrypted data
Cryptography
biblio
Research and Implementation on an Efficient Public Key Encryption Algorithm with Keyword Search Scheme
Submitted by aekwall on Mon, 02/15/2021 - 4:48pm
Public key
third-party server
third-party data
storage management
Servers
secret retrieval
searchable encryption algorithms
searchable encryption
Resiliency
query formulation
Public key Encryption with Keyword Search (PEKS)
public key encryption algorithm
public key encryption
public key cryptography
Cloud Computing
pubcrawl
NPEKS
network storage service
keyword search scheme
Keyword search
encryption
encrypted data
efficient encryption
data privacy
data confidentiality
cyber physical systems
corporate cloud storage environment
composability
biblio
Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
cloud computation server
arithmetic operations
multi-threading
privacy preserving
storage costs
FHE
bit-wise encoding
bit-wise implementation
bit-wise operation
Homomorphic encryption
function evaluation
lookup table
privacy preserving calculation
single-input function
single-integer input function
time 13.0 min
time 60.0 min
two-input function
Protocols
Scalability
Servers
cloud servers
Cryptography
encrypted data
encryption
data privacy
Table lookup
Cloud Computing
Resiliency
pubcrawl
Metrics
Databases
information retrieval
fully homomorphic encryption
Human Factors
encoding
biblio
Improving the Security Strength of Iseki’s Fully Homomorphic Encryption
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
finite element analysis
security strength
secure computation scheme
Iseki fully homomorphic encryption
Reliability engineering
outsourcing
Secure computation
Homomorphic encryption
C languages
Human Factors
Scalability
fully homomorphic encryption
Metrics
pubcrawl
Resiliency
cyber security
encryption
encrypted data
Cryptography
biblio
Quantum Homomorphic Encryption Based on Quantum Obfuscation
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
open question
telecommunication security
Scalability
Resiliency
Registers
Quantum point function
quantum obfuscation
Quantum mechanics
quantum homomorphic encryption scheme
Quantum homomorphic encryption
quantum computing security
quantum computation
public key cryptography
quantum computing
Metrics
Logic gates
Human Factors
Homomorphic encryption
encryption operator
encryption
encrypting party
encrypted data
decrypting party
data privacy
pubcrawl
security
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
Homomorphic encryption
storage paradigm
Scalability
Resiliency
public-key cryptosystem
pubcrawl
Paillier homomorphic encryption scheme
Paillier homomorphic cryptosystem
paillier cryptosystem
modular multiplicative arithmetic
Metrics
improved decryption process
Human Factors
Algorithm
fast decryption process
fast decryption algorithm
encryption
encrypted data
decryption speed
decryption
data privacy
Cryptography
Computational efficiency
computational cost
Complexity theory
Cathode ray tubes
biblio
A Noise-Free Homomorphic Encryption based on Chaotic System
Submitted by aekwall on Mon, 02/01/2021 - 11:35am
noise-free homomorphic encryption
EMORE algorithm
encryption-decryption time
enhanced matrix operation
FHE
floating-point number
homomorphism property
modular arithmetic operation
Noise Free
noise-free algorithm
EMORE
outsourced data computing
positive randomness properties
reliable cloud computing environment
reliable encryption
research topics
secure Cloud computing environment
secure encryption
symmetric algorithm
Correlation
Scalability
Cryptography
encrypted data
encryption
data privacy
Resiliency
pubcrawl
Metrics
Reliability
Cloud Computing
fully homomorphic encryption
Security analysis
Human Factors
Homomorphic encryption
outsourcing
chaotic system
Sensitivity
Symmetric matrices
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
1
2
3
next ›
last »