Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Protocols
biblio
Fog-QKD:Towards secure geospatial data sharing mechanism in geospatial fog computing system based on Quantum Key Distribution
Submitted by grigby1 on Fri, 07/21/2023 - 1:47pm
Low latency communication
security
Scalability
Resiliency
resilience
Quantum Key Distribution
quantum computing
pubcrawl
Protocols
information theoretic security
information security
geospatial fog computing
geospatial data
Geospatial analysis
Fog computing
complex networks
analysis
biblio
Secure and Efficient Privacy-preserving Authentication Scheme using Cuckoo Filter in Remote Patient Monitoring Network
Submitted by grigby1 on Thu, 07/20/2023 - 4:15pm
wireless sensor networks
Remote Patient Monitoring (RPM)
patient monitoring
Cuckoo filter
Resiliency
medical devices
expert systems
Privacy-preserving
Wireless communication
pubcrawl
Cloud Computing
Protocols
privacy
authentication
Scalability
resilience
Human behavior
biblio
Improvement of Final Exponentiation for a Pairing on FK12 Curve and its Implementation
Submitted by grigby1 on Tue, 07/18/2023 - 3:21pm
pubcrawl
resilience
Scalability
Cryptography
Protocols
Computers
Elliptic curves
Identity-based encryption
Resiliency
elliptic curve
Human Factors
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
biblio
CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing
Submitted by grigby1 on Fri, 07/14/2023 - 10:48am
System performance
encryption audits
editing privilege
cross-audit
Chameleon hash
redactable blockchain
blockchains
Costs
Resiliency
pubcrawl
Resists
Compositionality
Protocols
data privacy
performance evaluation
resilience
Metrics
biblio
Mining Large Data to Create a Balanced Vulnerability Detection Dataset for Embedded Linux System
Submitted by grigby1 on Thu, 07/13/2023 - 3:31pm
composability
secure software
Embedded System
Balanced Dataset
operating system
vulnerability detection
Resiliency
smart cities
Smart homes
Linux
Training
security mechanisms
Protocols
embedded systems
Safety
resilience
Metrics
pubcrawl
cyber security
biblio
Implementation of Efficient Hybrid Encryption Technique
Submitted by grigby1 on Thu, 07/13/2023 - 12:46pm
composability
Asymmetric Encryption
efficient encryption
ECDH
symmetric encryption
Elliptic curves
ECC
Multimedia systems
Elliptic curve cryptography
encryption
Computational modeling
Protocols
authentication
AES
Resiliency
resilience
pubcrawl
biblio
Anticounterfeiting Method for Drugs Using Synthetic DNA Cryptography
Submitted by grigby1 on Wed, 07/12/2023 - 1:34pm
drugs
Synthetic DNA
QR codes
DNA coding
Anti-countefeiting
DNA cryptography
Resiliency
Pandemics
COVID-19
Resists
information security
DNA
quantum computing
Protocols
privacy
resilience
Metrics
Human behavior
pubcrawl
biblio
Security Platoon Control of Connected Vehicle Systems under DoS Attacks and Dynamic Uncertainty
Submitted by grigby1 on Tue, 07/11/2023 - 2:17pm
simulation
Security Control
Platoon control
Dynamic uncertainty
Dynamical Systems
Communication channels
connected vehicles
Markov processes
Stability analysis
pubcrawl
uncertainty
DoS attacks
composability
Protocols
Resiliency
resilience
Metrics
biblio
Privacy-Preserving Cloud Data Model based on Differential Approach
Submitted by grigby1 on Fri, 06/30/2023 - 3:47pm
privacy
power control
privacy preservation
classification
image recognition
differential privacy
Cloud Computing
composability
Protocols
Support vector machines
Scalability
Radio frequency
Resiliency
resilience
Human behavior
pubcrawl
machine learning
biblio
Differential Privacy Protection Algorithm Based on Zero Trust Architecture for Industrial Internet
Submitted by grigby1 on Fri, 06/30/2023 - 3:47pm
composability
Zero trust architecture
security boundary
privacy security
Internet security
industrial internet
differential privacy
quality of service
real-time systems
pubcrawl
estimation
Protocols
privacy
Scalability
Resiliency
resilience
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »