Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Lattices
biblio
Cache attacks and countermeasures for NTRUEncrypt on MPSoCs: Post-quantum resistance for the IoT
Submitted by grigby1 on Fri, 02/02/2018 - 1:25pm
Post-quantum
timing
SoCs
security
Scalability
Resiliency
quantum computing security
quantum computing
pubcrawl
Cache Attack
NTRUEncrypt
Metrics
Lattices
IoT
Hardware
encryption
composability
biblio
A Homomorphic Signature Scheme for Quadratic Polynomials
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
polynomials
Vectors
tensors
tensor products
Tensile stress
Silicon
signature vectors
Servers
Scalability
Resiliency
quadratic polynomials
pubcrawl
Approximation algorithms
polynomial functions
normal SIS problems
normal short integer solution problems
Metrics
Lattices
information security
Human Factors
homomorphic signature scheme
Homomorphic encryption
digital signatures
cloud server
biblio
Ensuring information security by using Haskell's advanced type system
Submitted by grigby1 on Wed, 01/10/2018 - 12:18pm
pubcrawl
Resiliency
composability
Software
Libraries
Computer languages
Lattices
compiler security
biblio
DIBR synthesized image quality assessment based on morphological wavelets
Submitted by grigby1 on Wed, 03/08/2017 - 2:06pm
morphological filters
wavelet transforms
Signal resolution
rendering (computer graphics)
quincunx sampling
pubcrawl170111
nonuniform geometric distortions
nonseparable morphological wavelet decomposition
MW-PSNR
Multi-scale PSNR
morphological wavelets
morphological wavelet peak signal-to-noise ratio measure
morphological wavelet decomposition
depth image based rendering
Measurement
lifting scheme
Lattices
image quality metrics
Image quality
image filtering
edge detection
edge coherency
distortion
DIBR synthesized image quality assessment
DIBR synthesized image evaluation
biblio
"Discovery of De-identification Policies Considering Re-identification Risks and Information Loss"
Submitted by grigby1 on Thu, 02/23/2017 - 12:14pm
Lattices
Upper bound
UCI machine learning repository
Synthetic aperture sonar
Safe Harbor
risk analysis
reidentification risks
pubcrawl170105
privacy leakage
privacy
learning (artificial intelligence)
Computational modeling
information loss
information entropy
HIPPA
Entropy
deidentified data
deidentification policies
de-identification
data privacy
data analysis
biblio
"The two-hop interference untrusted-relay channel with confidential messages"
Submitted by grigby1 on Tue, 02/14/2017 - 1:05pm
pubcrawl
wireless channels
untrusted relay node
two hop interference untrusted relay channel
Trusted Computing
telecommunication security
structured codes
stochastic encoding
security
secure rate region
scaled compute-and-forward
Relays
relay networks (telecommunication)
radiofrequency interference
Science of Security
confidential messages
nested lattice codes
message transmission
message destination
Lattices
Jamming
Interference
Gaussian processes
Gaussian codewords
encryption block
encoding
direct links
Decoding
Cryptography
cooperative jamming
biblio
Bootstrapping Privacy Compliance in Big Data Systems
Submitted by BrandonB on Thu, 04/30/2015 - 1:40pm
program analysis
Map-Reduce-like Big Data systems
minimal human input
parallel programming
personalized user experiences
Policy
privacy
privacy compliance bootstrapping
privacy policy specification
Legal ease language
program annotation
search engines
Semantics
source code
source code (software)
user data handling
user trust
web services
computer bootstrapping
automatic privacy policy compliance checking
Big Data
Bing
business imperative privacy policies
Cloud Computing
cloud services
code-level schema element mapping
Compliance
advertising
conformance testing
data privacy
datatypes
Grok data inventory
Information Flow
information flow types
IP networks
Lattices
biblio
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
Computational modeling
covert channels
Lattices
Processor scheduling
secret information
secure information flow
security
security of data
Semantics
Sensitivity
timing
« first
‹ previous
1
2
3
4
5