Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computer science
biblio
A Group-Oriented Strong Designated Verifier Signature Scheme with Constant-Size Signatures
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
bilinear pairings
strong designated verifier
signer ambiguity
signature length
random oracle model
public key system
nontransferability
group-oriented strong designated verifier signature scheme
group-oriented
GO-SDVS scheme
constant-size signatures
constant-size
Scalability
adaptive chosen-message attacks
Oceans
computer science
handwriting recognition
public key cryptography
Public key
digital signatures
Generators
pubcrawl
Resiliency
digital signature
biblio
Constructing a Digital Signature Algorithm Based on the Difficulty of Some Expanded Root Problems
Submitted by aekwall on Mon, 06/22/2020 - 11:24am
Safety
Scalability
Resiliency
pubcrawl
testing
Mathematical model
digital signatures
Public key
computer science
digital signature
digital signature algorithm
Digital signature scheme
expanded root problem
high-security digital signature platform
Root problem
biblio
Trust is the Cure to Distributed Consensus with Adversaries
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
resilience
Iterative methods
Nonvolatile memory
optimisation
policy-based governance
Policy-Governed Secure Collaboration
Power supplies
Program processors
pubcrawl
Hardware
Resiliency
Scalability
social engineering networked systems
Task Analysis
trust evaluation mechanism
trust graph model
trust propagation scheme
trust-aware consensus algorithm
decision theory
composability
Computer Theory and Trust
access protocols
Byzantine adversary detection
computer science
consensus iteration process
Decision Making
decision making problem
Compositionality
distributed consensus algorithm
distributed consensus problems
distributed optimization
economic engineering networked systems
energy harvesting
false trust
graph theory
biblio
Cellular Automata Based Hashing Algorithm (CABHA) for Strong Cryptographic Hash Function
Submitted by aekwall on Mon, 06/08/2020 - 11:33am
Resistance
hash algorithms
permutation
One-way Function
message integrity
message authenticity
cryptographic hash functions
Cryptographic Hash Function
cellular automata based hashing algorithm
cellular automata
CABHA algorithm
Cryptography
Compositionality
digital signature
computer science
automata
finite element analysis
cryptographic applications
message authentication
pubcrawl
Resiliency
information security
biblio
Implementation of Lightweight Stream Cipher in AODV Routing Protocol for MANET
Submitted by grigby1 on Mon, 06/01/2020 - 3:59pm
AODV
Blackhole attack
computer science
encryption
HMAC
lightweight stream cipher
MANET
mobile ad hoc networks
pubcrawl
resilience
Resiliency
Routing
Routing protocols
Scalability
Trivium
biblio
FGAC-NDN: Fine-Grained Access Control for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 3:54pm
Mobility
telecommunication network routing
specific user
Servers
Scalability
Resiliency
resilience
Receivers
pubcrawl
promising information-centric networking architectures
potential receivers
network architecture
named data networking
Named Data Network Security
named data network
Access Control
internet
Industries
Human behavior
fine-grained access control mechanism
fine-grained access control
FGAC-NDN
desired file
desired content
DBDH assumption
data confidentiality
computer science
cache storage
Bilinear Pairing
authorisation
biblio
Feature Based Image Registration using Heuristic Nearest Neighbour Search
Submitted by grigby1 on Fri, 05/22/2020 - 2:37pm
feature based image matching techniques
threshold accepting
simulated annealing
nearest-neighbor
nearest neighbour search done
image segmentation
image registration
image matching
image feature matching
heuristic Nearest Neighbour Search
Feature Matching
feature based image registration
feature extraction
Exhaustive Search
combinatorial optimization
nearest neighbor search
search problems
Detectors
Task Analysis
nearest neighbour methods
Measurement
Metrics
computer science
pubcrawl
biblio
DURS: A Distributed Method for k-Nearest Neighbor Search on Uncertain Graphs
Submitted by grigby1 on Fri, 05/22/2020 - 2:22pm
distributed system
nearest neighbor search
uncertain graphs
social networking (online)
scalable search
Scalability
Market research
k-nearest neighbor search
k-nearest neighbor queries
k-nearest neighbor
DURS
pubcrawl
biology
query processing
graph theory
probability
nearest neighbour methods
Measurement
Metrics
computer science
Indexes
Correlation
biblio
LSTM for Anomaly-Based Network Intrusion Detection
Submitted by aekwall on Mon, 05/11/2020 - 11:12am
network traffic
network system
Long-Short-Term Memory
CIDDS dataset
anomaly-based network intrusion detection
Long short-term memory
LSTM
computer science
deep learning
Recurrent neural networks
recurrent neural nets
Intrusion Detection
security of data
Anomaly Detection
testing
Training
network intrusion detection
Metrics
composability
pubcrawl
Resiliency
learning (artificial intelligence)
intrusion detection system
computer network security
biblio
Trustworthy Misinformation Mitigation with Soft Information Nudging
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
social networking (online)
misinformation mitigation techniques
news sources
nudge theory
Organizations
pubcrawl
recommendation
recommender systems
Resiliency
Social network services
misinformation
social recommendation algorithms
soft information nudging
technological solutions
technology solutions
trust nudging
Trusted Computing
trusted sources
trustworthy misinformation mitigation
Trustworthy Systems
cyber physical systems
trust
cognition
Companies
composability
Compositionality
computer science
Computer Theory and Trust
conspiracy news consumers
conspiracy theories
Computing Theory
Decision support systems
disinformation
Economics
Feeds
information consumption
information decisions
information sources
information trust
Media
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »