Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encrypted data
biblio
Training Neural Network Over Encrypted Data
Submitted by aekwall on Mon, 01/18/2021 - 11:27am
convolutional neural networks
Fuzzy Cryptography
private company policy
plain data
image permutation
image data encryption
convolutional neural network classifier
convolutional classifier
image classification
neural network
Image color analysis
Scalability
convolutional neural nets
Training
pattern classification
Metrics
pubcrawl
Resiliency
learning (artificial intelligence)
encryption
encrypted data
Cryptography
biblio
Achieving Secure and Effective Search Services in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 11:55am
cloud services
Computing Theory and Privacy
WMFS scheme
wildcard-based multikeyword fuzzy search scheme
wildcard
substring matching
secure fuzzy search schemes
search services
search patterns
keyword misspellings
fuzzy search
database indexing
file organisation
Dictionaries
user privacy
Cloud Computing
Indexes
fuzzy set theory
data structures
query processing
pubcrawl
Human behavior
Resiliency
searchable encryption
data privacy
encryption
encrypted data
Cryptography
Scalability
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
PlaidML-HE: Acceleration of Deep Learning Kernels to Compute on Encrypted Data
Submitted by grigby1 on Fri, 08/07/2020 - 3:48pm
machine learning as a service
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving machine learning
privacy
PPML inference
PlaidML-HE
MLaaS
ML Service
ML kernels
ML front-end frameworks
AI
machine learning
learning (artificial intelligence)
inference mechanisms
Human Factors
Human behavior
Homomorphic encryption
encrypted data
deep learning kernels
data privacy
Cryptography
cryptographic primitives
compiler
biblio
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
CP-ABE
collaboration
Identity and Access Management structure
IAM
fine-grained data access control
DUR-CP-ABE
discretionary user revocation
Discretionary Revocation
directory
cloud storage solutions
cloud storage
cloud servers
Ciphertext policy attribute-based encryption
batch revocation functionality
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
Cryptography
policy-based governance
pubcrawl
encrypted data
storage management
cryptographic solutions
Organizations
Scalability
Servers
cloud data
Cloud Computing
authorisation
Access Control
encryption
biblio
Multi-keyword Ranked Searchable Encryption Supporting CP-ABE Test
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
Indexes
text analysis
searchable encryption
Scalability
ranked search
pubcrawl
program testing
policy-based governance
multikeyword ranked searchable encryption
multi-keyword search
IoT devices
Internet of Things
ciphertext searching
Frequency modulation
encryption
encrypted data
data privacy
Cryptography
CP-ABE test
CP-ABE
collaboration
Cloud Computing
ciphertext-policy attribute-based encryption test
ciphertext-policy attribute-based encryption
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
outsourced data
white box cryptography
white-box traceablity
white-box traceable CP-ABE
outsourced data security
original key owner
malicious cloud users
fully secure traceable CP-ABE system
commitment
catch people
access credentials
cloud storage service
Context
Law
fine-grained access control
Cloud Computing
outsourcing
Metrics
composability
pubcrawl
Resiliency
cloud storage
Access Control
encryption
encrypted data
Data Security
Cryptography
authorisation
ciphertext-policy attribute-based encryption
biblio
Efficient and Secure k-Nearest Neighbor Search Over Encrypted Data in Public Cloud
Submitted by grigby1 on Fri, 05/22/2020 - 2:35pm
k-NN search schemes
data owners
data points
data sharing
Electric fields
Electron traps
encrypted data
Impact ionization
Junctions
authorized data users
matrix similarity
Photoconductivity
public cloud
query privacy
search services
secure query services
valuable outsourced data
Cryptography
nearest neighbor search
k-nearest neighbor search
search problems
data storage
security property
nearest neighbour methods
Measurement
Metrics
Security analysis
Cloud Computing
data privacy
Mathematical model
matrix algebra
pubcrawl
authorisation
biblio
The Strength of Weak Randomization: Easily Deployable, Efficiently Searchable Encryption with Minimal Leakage
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
Metrics
weak randomization
untrusted service
standards
Servers
searchable encryption
searchable database encryption scheme
Resiliency
resilience
relational databases
relational database security
relational database engine
pubcrawl
probability
outsourcing
Cloud Computing
legacy service
inference attacks
Human behavior
Entropy
encryption
encrypted data
document management systems
document handling
deployable database encryption scheme
data privacy
Cryptography
computer security
composability
« first
‹ previous
1
2
3
next ›
last »