Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public key cryptography
biblio
An Implementation of Data Exchange in Environmental Monitoring Using Authenticated Attribute-Based Encryption with Revocation
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
CP-ABE
WSN
Time Stamp Digital Signature
revocation
original data
environmental monitoring
data exchange
data centers
data center
collection process
collaboration
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption
policy-based governance
Wireless Sensor Network
wireless sensor networks
pubcrawl
public key cryptography
digital signatures
data integrity
Scalability
Public key
authorisation
Internet of Things
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
NIST curves
IoT-connected healthcare system
key policy attribute based encryption
Key Policy Attribute Based Encryption (KP-ABE)
key-policy
KP-ABE
Lightweight
lightweight key-policy attribute-based encryption scheme
Logic gates
Internet of Things (IoT)
policy-based governance
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
selective-set model
smart phones
delegation feature
Attribute-based
biomedical communication
Chosen-plaintext attack
ciphertext indistinguishability
collaboration
computer network security
cryptanalysis
decryption key
Android phone
encryption
fixed KP-ABE scheme
H-KP-ABE
health care
hierarchical
hierarchical KP-ABE
Internet of Things
biblio
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
central authority
collaboration
user collusion avoidance
Resists
privacy-preserving decentralized KP-ABE
key policy
decisional bilinear Diffie-Hellman assumption
decentralized KP-ABE scheme
decentralized KP ABE scheme
decentralized key policy ABE schemes
Decentralized attribute-based encryption
DBDH assumption
collusion attack
encryption
attributed-based encryption
KP-ABE
key policy attribute based encryption
policy-based governance
pubcrawl
public key cryptography
Generators
privacy
Scalability
Public key
data privacy
authorisation
biblio
Protect white-box AES to resist table composition attacks
Submitted by aekwall on Mon, 07/20/2020 - 10:54am
cryptographic software protection
white box cryptography
white-box cryptography
white-box attack context
white-box AES protection
WBAC
Time complexity
table-composition-targeting white-box attacks
table-composition-targeting cryptanalysis techniques
key-embedding lookup tables
key recovery attacks
De Mulder et al.'s attack
Resiliency
Billet et al.'s attack
affine mappings
Table lookup
Secret key
computational complexity
public key cryptography
Data protection
Metrics
composability
pubcrawl
biblio
Exploring Potentials and Challenges of Blockchain-based Public Key Infrastructures
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
public key cryptography
web of trust
usability issues
usability
trustless immutable ledger
traditional public key infrastructures
smart contracts
Servers
Resiliency
public key infrastructure
blockchain
Public key
pubcrawl
independent solutions
independent blockchain-based solutions
fast consensus
composability
blockchain-based public key infrastructures
blockchain technology
blockchain development
biblio
Decentralized Identification and Certification System
Submitted by aekwall on Mon, 07/13/2020 - 11:19am
flexible management
web of trust
web-of-trust concept
user identificators
integrity and authenticity
individual IoT sensor
identification and certification
decentralized system
decentralized public key infrastructure
decentralized identification
decentralized environment
current public key infrastructure
certification system
certification
Servers
public key infrastructure
computer science
authenticity
blockchain technology
public key cryptography
Public key
standards
composability
pubcrawl
Resiliency
History
Cryptographic Protocols
Internet of Things
biblio
Secure Visible Light Encryption Communication Technique for Smart Home Service
Submitted by aekwall on Mon, 07/13/2020 - 11:18am
smart home service
Resiliency
RMSE
RSA encryption
RSA encryption process
Scalability
secure visible light encryption communication technique
secure VL communication technique
Signal to noise ratio
Receivers
smart indoor service
SNR
telecommunication security
Transmitters
visible light communication
visible signal characteristic
Visual Light Communications Security
asymmetric encryption key
public key cryptography
Public key
pubcrawl
private key
performance enhancement
optimal key length
Metrics
mean square error methods
key length
intrusion
home computing
free-space optical communication
encryption
Correlation
asymmetric Rivest-Shamir-Adleman encryption method
biblio
Fault tolerant non-linear techniques for scalar multiplication in ECC
Submitted by aekwall on Mon, 07/06/2020 - 9:57am
asymmetric cryptography algorithms
shorter key length
Scalar multiplication point
nonlinear error detection codes
injected faults
faulty results
fault tolerant nonlinear techniques
Fault Tolerant
false information
error detection codes
elliptic curve scalar multiplication point
cryptographic computations
case channel error detection codes
Scalability
cryptology
ECC
Elliptic curve cryptography
security level
public key cryptography
fault tolerant computing
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
encryption
biblio
Implementation and Comparison of SPA and DPA Countermeasures for Elliptic Curve Point Multiplication
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
Logic gates
Simple Power Analysis Attack
side channel analysis attacks
Scalability
Resiliency
resilience
public key cryptography
pubcrawl
power analysis attacks
Metrics
Differential Power Analysis Attack
integrated circuits
hardware description languages
elliptic curve point multiplication
elliptic curve cryptosystems
Elliptic Curve Cryptosystem
Elliptic curve cryptography
DPA countermeasures
differential power analysis attacks
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »