Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption
biblio
Security Enhancing and Probability Shaping Coordinated Optimization for CAP-PON in Physical Layer
Submitted by aekwall on Sun, 10/16/2022 - 5:11pm
security
encryption
pubcrawl
Metrics
Resiliency
composability
encoding
Probabilistic logic
Physical layer
physical layer security
Photonics
DNA
biblio
Enhancing Source-Location Privacy in IoT Wireless Sensor Networks Routing
Submitted by grigby1 on Mon, 10/03/2022 - 11:46am
Routing
Source Location Privavy
Costs
Location Privacy in Wireless Networks
location privacy
WSN
evaluation
wireless networks
energy consumption
Compositionality
component
encryption
composability
Wireless communication
wireless sensor networks
Protocols
privacy
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Fuzzy AHP based Ranking of Cryptography Indicators
Submitted by grigby1 on Tue, 09/20/2022 - 1:33pm
Telecommunications
Fuzzy Cryptography
Quantum encryption
Multi-criteria decision-making
FAHP
Costs
Resiliency
analytic hierarchy process
RSA
encryption
Robustness
Artificial Intelligence
Scalability
AES
Hardware
resilience
Metrics
pubcrawl
biblio
Trusted Fog Computing for Privacy Smart Contract Blockchain
Submitted by grigby1 on Fri, 09/16/2022 - 3:38pm
encryption
Cloud Computing
security
pubcrawl
resilience
Scalability
privacy
Fog computing
network security
smart contracts
Loss measurement
MPC
privacy computing
Resiliency
blockchains
Block Chain
biblio
Convergence of Cloud and Fog Computing for Security Enhancement
Submitted by grigby1 on Fri, 09/16/2022 - 3:37pm
Fog computing
Security monitoring framework
cloud server
virtual machine
Costs
Resiliency
computing resources
cyber-attack
Virtual machining
encryption
edge computing
Scalability
resilience
pubcrawl
Servers
Monitoring
security
Cloud Computing
biblio
Security Protection Scheme of Embedded System Running Environment based on TCM
Submitted by aekwall on Fri, 08/26/2022 - 11:22am
embedded systems
performance evaluation
Trusted Computing
encryption
pubcrawl
Metrics
Resiliency
composability
Software algorithms
Runtime environment
Seminars
chain of trust
cryptographic application
embedded OS
system enforcement
biblio
SoK: Fully Homomorphic Encryption Compilers
Submitted by grigby1 on Fri, 08/12/2022 - 1:10pm
tools
encryption
pubcrawl
Resiliency
privacy
composability
Metrics
resilience
Data Breach
Surges
SoK
usability
compiler security
compilers
FHE
Fully-Homomorphic-Encryption
biblio
Applied Cryptography in Network Systems Security for Cyberattack Prevention
Submitted by grigby1 on Tue, 08/02/2022 - 3:20pm
Applied cryptography
Cryptography
encryption
fabrication
Hash functions
Interception
Interruption
modification
network security
pubcrawl
Public key
resilience
Resiliency
RSA
Trustworthy Systems
Virtual private networks
biblio
Communication Security Design of Distribution Automation System with Multiple Protection
Submitted by grigby1 on Fri, 07/29/2022 - 4:14pm
encryption
pubcrawl
resilience
Resiliency
Conferences
computer security
power grids
Consumer electronics
automation
Operating systems security
communication security
distribution automation system
encryption distribution terminal
multiple protection
biblio
A Practical and Secure Stateless Order Preserving Encryption for Outsourced Databases
Submitted by grigby1 on Fri, 07/29/2022 - 3:47pm
encryption
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Databases
estimation
Metrics
Sorting
Non-deterministic OPE
Order Preserving Encryption
Range Query over Encrypted Databases
outsourced database security
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »