Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data integrity
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
lost attack
verification stage
tamper attack
storage management
Servers
Scalability
Resiliency
remote data integrity checking protocols
quantum computer attacks
public key cryptography
pubcrawl
provably secure
Protocols
matrix-vector multiplication
matrix multiplication
matrix-matrix multiplication
Cloud Computing
Lattices
lattice-based constructed cryptography
Identity management
identity-based remote data integrity checking protocol
ID-Based cryptography
Human behavior
data privacy
Data models
data integrity checking
data integrity
Cryptography
Cryptographic Protocols
communication cost
cloud storage
cloud service provider attack
biblio
Software-Design for Internal Security Checks with Dynamic Integrity Measurement (DIM)
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
security software tools
internal security checks
Kernel
kernel architecture
Linux
malicious components
Memory management
memory measurment
multiple related components
pubcrawl
Resiliency
integrity measurement architecture
software design
Software measurement
software tools
system components
system state verification
TCG
The Concise Binary Object Representation (CBOR)
Trusted Platform Module (TPM)
trusted platform modules
DIM
attestation operations
binary code
Binary codes
central components
complex attestation strategies
composability
cooperation project
cryptographic hashes
Cryptography
data integrity
Aerospace electronics
DRA
dynamic integrity measurement
Dynamic Runtime Attestation
extensibility
extensible architecture
flexibility
flexible architecture
Guidelines
IMA
biblio
A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data
Submitted by grigby1 on Tue, 02/06/2018 - 1:47pm
outsourcing
verification codes
verifiable single keyword top-k search scheme
Top-k
Servers
security of data
security issues
Scalability
resource outsourcing
Resiliency
pubcrawl
Protocols
big data security in the cloud
Metrics
Keyword search
integrity verification
insider attacks
existing secure keyword search methods
Data models
data integrity
computer science
cloud servers
cloud data
Cloud Computing
biblio
Considerations for secure and resilient satellite architectures
Submitted by K_Hooper on Fri, 02/02/2018 - 11:06am
Resiliency
aerospace computing
Aerospace electronics
architectural design considerations
artificial satellites
cyber-physical systems)
data confidentiality
data integrity
ground segment
notional satellite architecture
Orbits
potential attack vectors
potential security risks
Propulsion
pubcrawl
Vulnerability Analysis
resilient satellite architectures
Resilient Security Architectures
risk analysis
satellite architecture
Satellite broadcasting
Satellites
secure satellite architectures
security
security of data
security vulnerabilities
Space vehicles
spacecraft systems
systems-level approach
uplink/downlink components
biblio
Leveraging Data Provenance to Enhance Cyber Resilience
Submitted by K_Hooper on Fri, 02/02/2018 - 11:05am
Resiliency
pubcrawl
Linux
Kernel
Instruments
Electronic mail
Databases
data provenance
data integrity
cyber resilience
computer architecture
background information
security of data
secure systems
Resilient Security Architectures
biblio
Auditing of Data Integrity over Dynamic Data in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
outsourced data
vector commitment
Servers
security of data
security feature
secure data auditing mechanism
Resiliency
remote data storage
remote cloud data
Public key
pubcrawl
outsourcing
Outsourced Database Integrity
backward unlinkable verifier local revocation group signature
Metrics
Memory
dynamic data
Databases
data integrity
data auditing
computational time complexity
composability
Collusion Attacks
Clustering algorithms
cloud server
Cloud Computing
biblio
A New Scheme for Protecting the Privacy and Integrity of Spatial Data on the Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
indexing
Z-curve
Spatial databases
spatial data
Resiliency
Redundancy
query processing
pubcrawl
privacy protection
Outsourced Database Integrity
Outsourced Database
Metrics
IT costs
indexing scheme
cloud
Indexes
encryption
Database Security
database querying
data redundancy
data privacy
data integrity
data centers
Cryptography
computer centres
composability
Cloud Security
Cloud Computing
biblio
A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
Resiliency
optimal search efficiency
Outsourced Database Integrity
outsourcing
Privacy-preserving
privacy-preserving multikeyword ranked search
pubcrawl
query generation
query processing
multi-keyword ranked search
sensitive data outsourcing
Servers
TF×IDF model
top-k search
trapdoor
tree data structures
vector space model
word-digest
data privacy
authentication
ciphertext search
Cloud Computing
cloud data
communication overhead reduction
composability
Cryptography
data integrity
authenticated data structure
database indexing
encrypted cloud data
index construction
Indexes
inverted file index
Metrics
MIR-tree
MIR-tree based index
biblio
Privacy preserving auditing for shared data in cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:16pm
Outsourced Database Integrity
TPA
third-party auditor
Third Party Auditor (TPA)
shared data integrity verification
shared data
Servers
resource allocation
Resiliency
public verifiers
pubcrawl
privacy preserving auditing
privacy preserving
outsourcing
Cloud Computing
on-demand computing resource delivery
Metrics
group signature
encryption
Databases
data storage
Data protection
data privacy
data integrity
data centers
computer centres
composability
cloud data integrity
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
next ›
last »