Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
storage costs
biblio
Privacy Preserving Calculation in Cloud using Fully Homomorphic Encryption with Table Lookup
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
cloud computation server
arithmetic operations
multi-threading
privacy preserving
storage costs
FHE
bit-wise encoding
bit-wise implementation
bit-wise operation
Homomorphic encryption
function evaluation
lookup table
privacy preserving calculation
single-input function
single-integer input function
time 13.0 min
time 60.0 min
two-input function
Protocols
Scalability
Servers
cloud servers
Cryptography
encrypted data
encryption
data privacy
Table lookup
Cloud Computing
Resiliency
pubcrawl
Metrics
Databases
information retrieval
fully homomorphic encryption
Human Factors
encoding
biblio
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
nondesignated receivers
data reencryption
file transfer protocol
Formal Security Models
FTP-NDN
named data network
Named Data Networking (NDN)
NDN nodes
network flow requirement
data confidentiality
re-encryption
storage costs
TCP-IP networks
unknown potential receivers
usage amount
users
video services
Named Data Network Security
transport protocols
Scalability
Servers
telecommunication traffic
Cryptography
Access Control
Receivers
Protocols
computer architecture
computer network security
Resiliency
Human behavior
pubcrawl
internet
network traffic
ciphertext transmission
complete secure file transfer protocol
biblio
Concurrency Strategies for Attack Graph Generation
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
pubcrawl
Multi-threaded Programming
network attack graph
network security
network state space
OpenMP
OpenMP-based programming implementation
parallel algorithms
Predictive Metrics
Metrics
resilience
Resiliency
Scalability
scalable attack graphs
security of data
storage costs
storage management
telecommunication security
Concurrent computing
security
attack graph
attack graph generation
attack graphs
composability
Computational modeling
concurrency control
concurrency strategies
Concurrency
cyber-physical system
cyber-physical systems
cyberphysical
Generators
graph theory
Instruction sets
large-scale graph
message passing