Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encrypted data
biblio
A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
trusted third party
resilience
Resiliency
composability
pubcrawl
weak trust
verification
verifiable multiuser searchable encryption schemes
verifiable dynamic multiuser searchable encryption scheme
user search permissions
user permission
user access permission matrices
Cryptography
secure data sharing
multiuser settings
multiuser searchable encryption schemes
dynamic management
Multi-user
encrypted data
searchable encryption
public key cryptography
cloud server
Cloud Computing
authorisation
biblio
Scalable Distributed Random Number Generation Based on Homomorphic Encryption
Submitted by aekwall on Mon, 03/16/2020 - 10:40am
Metrics
verifiable random functions
verifiable random function
scalable verification
scalable distributed random number generation
Scalability
Resiliency
random number generation
random key generation
random beacons
publicly-verifiable randomness
public key cryptography
pubcrawl
Predictive Metrics
blockchain based applications
mathematical operations
Human behavior
Homomorphic encryption
encrypted data
elliptic curve multiplications
Elliptic curve cryptography
distributed network
distributed ledgers
decentralized schemes
Cryptographic Protocols
Compositionality
blockchain context
biblio
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
secure scheme
Outsourced Database
outsourcing
privacy
privacy concerns
pubcrawl
query processing
query results
result integrity
scalable scheme
one-dimensional query
secure tree index
Servers
SQL
SQL queries
sublinear query time
tree data structures
verifiability
verifiable range queries
database management systems
Metrics
composability
Resiliency
cloud adoption
Cryptography
data encryption
data outsourcing
data privacy
Outsourced Database Integrity
efficiency
efficient range queries
encrypted data
formal security analysis
Indexes
Multi-dimensional range query
multidimensional data records
multidimensional range query
biblio
Analysis of Forward Private Searchable Encryption and Its Application to Multi-Client Settings
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
forward private searchable encryption
Trusted Computing
single client environment
Servers
Resiliency
resilience
pubcrawl
privacy-preserving searches
privacy
forward secure SE schemes
searchable encryption
forward private SE schemes
forward privacy
encryption
encrypted data
data privacy
Cryptography
computer security
composability
biblio
Implementation of Searchable Encryption System with Dedicated Hardware and Its Evaluation
Submitted by grigby1 on Thu, 09/26/2019 - 10:27am
database management systems
shared database
searchable encryption system
Medical services
Hardware Implementation
encrypted data
dedicated hardware
symmetric searchable encryption
public key encryption with keyword search
Big Data
personal information
searchable encryption
Artificial Intelligence
Cryptography
composability
Resiliency
pubcrawl
resilience
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 11:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
biblio
Towards trustworthy data in networked control systems: A hardware-based approach
Submitted by grigby1 on Fri, 10/26/2018 - 4:52pm
malfunctioning systems
trustworthy data
transferred data needs
telecommunication security
smart factories
security
Scalability
Resiliency
pubcrawl
process control
networked control systems
Networked Control System
NCS
captured sensor data
Loss measurement
hardware-based approach
forward error correction
encryption
encrypted data
denial-of-service attacks
delays
Cryptography
correct functionality
controlled process
Communication channels
biblio
REX: A Searchable Symmetric Encryption Scheme Supporting Range Queries
Submitted by grigby1 on Fri, 09/28/2018 - 4:20pm
resilience
pubcrawl
composability
Resiliency
encrypted data
searchable encryption
Secure computation
cyber physical systems
range query
efficient encryption
biblio
A Scattering Technique for Protecting Cryptographic Keys in the Cloud
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
cryptographic keys protection
on-demand computing
Memory Protection
key-scattering approach
key extraction tools
encryption
encrypted data
Data Analytics
data analysis
private key cryptography
Cloud Security
Cloud Computing
business critical-data
brute force attacks
Big Data
AES cryptographic keys
advanced encryption standard
scattering technique
VMs
VM random access memory
virtual machines
untrusted cloud providers
storage capabilities
standards
standard AES algorithm
Secure Cryptographic Keys
widely used computing paradigm
Scattering
Resilient Security Architectures
Resiliency
random-access storage
Random access memory
RAM
pubcrawl
file
Efficient Similarity Search over Encrypted Data
Submitted by Katie Dey on Wed, 12/19/2012 - 2:31pm. Contributors:
Murat Kantarcioglu
Mehmet Kuzu
Mohammad Islam
ABSTRACT
SaTC Posters
encrypted data
similarity search
University of Texas at Dallas
0845803
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
1
2
3