Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security analysis
biblio
Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing
Submitted by grigby1 on Tue, 01/16/2018 - 5:36pm
file servers
Security analysis
Scalability
Resiliency
query-response mechanism
query processing
Public key
pubcrawl
Metrics
matrix algebra
LSSS matrix
Human Factors
Homomorphic encryption
fully homomorphic encryption scheme
Access Control
encryption
data retrieval scheme
data privacy security
data privacy
data access
Cryptography
collusion attack
cloud servers
Cloud Computing
ciphertext retrieval
authorisation
attribute revocation
attribute encryption
biblio
Data Protection in OpenStack
Submitted by grigby1 on Tue, 01/16/2018 - 5:33pm
operational cloud deployment
virtual machines
virtual machine images
storage encryption
security of data
security features
Security analysis
Scalability
Resiliency
public domain software
pubcrawl
Pervasive Computing Security
Organizations
basic security controls
OpenStack range
Open Source Software
open source cloud computing platform
Neutrons
Metrics
Human Factors
Hardware
encryption
Data Security
Data protection
cloud providers
Cloud Computing
biblio
A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
robust scheme
Hyper-chaos
hyper-chaos systems
image encryption
image encryption scheme
image sequences
Metrics
pubcrawl
Resiliency
Histograms
secure Hash algorithm SHA-1
Security analysis
Sensitivity
SHA-1
sub-vectors confusion
two-diffusion process
XOR operation
4D hyperchaotic system
highest security level
Entropy
encryption schemes
encryption process
encryption
digital image encryption
diffusion layers
Diffusion
Cryptography
Correlation
Confusion
composability
chaotic index sequence
chaotic cryptography
chaos
biblio
Efficient Hybrid Encryption System Based on Block Cipher and Chaos Generator
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
hybrid cryptosystem
video signal processing
video encryption
Symmetric Key Cryptography
Streaming media
Security analysis
Resiliency
real-time systems
pubcrawl
Multimedia systems
multimedia data
multimedia content
Metrics
hybrid video cryptosystem
hybrid encryption system
advanced encryption standard
high initial-value sensitivity
Hardware performance analysis
Hardware
encryption
CTR mode
Cryptography
composability
chaotic cryptography
chaos generators
chaos generator
Block Cipher
Algorithm design and analysis
AES
biblio
Residue Number System as a side channel and fault injection attack countermeasure in elliptic curve cryptography
Submitted by grigby1 on Mon, 11/27/2017 - 11:06am
pragmatic hazard
side channel attack
Security analysis
scalar multiplication
RNS
Resistance
Resiliency
residue number systems
residue number system
public key cryptography
pubcrawl
Algorithm design and analysis
power analysis
PA-FA countermeasure
Metrics
Manganese
fault injection attack
fault detection
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Electronic mail
composability
biblio
Security analysis of the RBS block cipher
Submitted by grigby1 on Mon, 11/13/2017 - 10:55am
radiofrequency identification
Wireless communication
Time Frequency Analysis
Time complexity
telecommunication security
Security analysis
security
Scalability
S-box
RFID systems
Resiliency
RBS design
RBS block cipher
radiofrequency identification systems
Algorithm design and analysis
pubcrawl
P-box
Metrics
lightweight encryption algorithm
encryption key
encryption
decryptions
data complexity
Cryptography
conventional block cipher elements
computational complexity
Ciphers
authentication
biblio
Systematic Analysis of Qualitative Data in Security
Submitted by grigby1 on Fri, 11/03/2017 - 10:24am
grounded theory
predictability
pubcrawl
qualitative
Resiliency
Scalability
Security analysis
Security Heuristics
biblio
An In-Depth Study of More Than Ten Years of Java Exploitation
Submitted by K_Hooper on Wed, 11/01/2017 - 10:04am
Security analysis
Scalability
resilience
pubcrawl
java security
Human behavior
exploits
Attack vectors
Access Control
biblio
Systematic Analysis of Qualitative Data in Security
Submitted by grigby1 on Mon, 07/24/2017 - 12:56pm
Control Theory
grounded theory
pubcrawl
qualitative
Resiliency
security
Security analysis
biblio
Analyzing the Security and Privacy of Cloud-based Video Surveillance Systems
Submitted by grigby1 on Tue, 06/27/2017 - 12:48pm
cloud
Damage Assessment
embedded security
home automation
Internet of Things
Metrics
pentesting
privacy
pubcrawl
Resiliency
Scalability
Security analysis
surveillance systems
user privacy
user privacy in the cloud
video surveillance
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »