Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CA
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
Does the NIS implementation strategy effectively address cyber security risks in the UK?
Submitted by aekwall on Mon, 02/17/2020 - 2:28pm
NIS directive
cyber spaces
cyber-risk management capabilities
cyber-security risk management capabilities
DSP
IGP
legislation
national framework
NCSC
network and information security
NIS
cyber security risks
NIS framework
NIS implementation
NIS implementation strategy
NIS key strategic objectives
NIS objectives
noncyber elements
OES
Regulation
Smart City
UK Critical National Infrastructure sectors
Standards organizations
security of data
Computer crime
Scalability
cyber security
Resiliency
pubcrawl
Metrics
Supply Chain
risk management
cyber-physical security
IoT
cyber attack
Security Risk Management
CA
CNI
CNI sectors
collaborative implementation approach
connected smart technology implementations
critical national infrastructure
cross-sector CNI service security measures
cyber risk management
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:32pm
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks