Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cyber Physical System
biblio
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
face recognition
two factor authentication
web authentication methods
user authentication
single-factor authentication
secure authentication
Digital Multifactor authentication
Cyber Physical System
two-factor authentication
multifactor authentication
Multi-factor authentication
Servers
Human Factors
Fingerprint recognition
sensors
password
message authentication
authentication
Cryptography
pubcrawl
cyber-physical systems
authorisation
biblio
A Novel Key-Value Based Real-Time Data Management Framework for Ship Integrated Power Cyber-Physical System
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
relational databases
power engineering computing
power system management
power systems
pubcrawl
Real-time Data Management
real-time data management prototype system
real-time data processing
real-time systems
relational data management
open source in-memory key-value store
resilience
Resiliency
Scalability
ship Big Data
ship integrated power cyber-physical system
ship integrated power cyber-physics system
ships
storage management
Human behavior
Cyber Physical System
cyber-physical system
cyber-physical systems
data handling
Data models
Data processing
data-driven intelligence
delays
generation ship integrated power system
Big Data
Human Factors
Integrated Power System
IPS
key-value data model
Key-value Store
marine engineering
Marine vehicles
Metrics
biblio
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Submitted by grigby1 on Tue, 01/07/2020 - 10:55am
repeated encryption
multiuser searchable encryption scheme
outsourced encrypted data
outsourcing
PS
pubcrawl
Public key
query processing
query transformation
multiple owners
resilience
Resiliency
SE schemes
search operation
secure proxy server approach
Servers
user queries
cyber physical systems
attribute-based encryption
authorisation
Broadcast Encryption
Cloud Computing
cloud data
composability
Cryptography
Cyber Physical System
abe
data privacy
document handling
efficient encryption
encryption
Euclidean distance
existing SE approaches
Indexes
biblio
An Efficient SAT-Attack Algorithm Against Logic Encryption
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
information science
Superluminescent diodes
SAT-attack algorithm
SAT
Resiliency
resilience
pubcrawl
logic IP protection
Logic gates
logic encryption
integrated circuits
Benchmark testing
encryption
encrypted circuits
efficient encryption
decryption
cyber physical systems
Cyber Physical System
Cryptography
computability
composability
biblio
An Efficient Framework for Big Data Security Based on Selection Encryption on Amazonec2
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
encryption
unimportant portion
Toss-A-Coin method
Selective Encryption
selection encryption
security framework
Resiliency
resilience
pubcrawl
ordinary encryption methods
Indexes
encryption time
encryption method
Amazon EC2
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
computer science
composability
Cloud Computing
cloud
Ciphers
big data security
Big Data
biblio
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
encrypted files
secure data sharing
Resiliency
resilience
re-encryption keys
Public key
pubcrawl
Proxy re-encryption
protecting sensitive files
key-aggregate proxy re-encryption scheme
Key-Aggregate Cryptosystem
key-aggregate approach
encryption
Access Control
efficient key-aggregate proxy re-encryption
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
conditional proxy re-encryption schemes
computer science
composability
cloud servers
Cloud Computing
authorisation
biblio
Efficient Video Encryption Using Lightweight Cryptography Algorithm
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
Resiliency
lightweight cryptography algorithm
lightweight encryption methods
low computation cost
low powered battery operated devices
natural redundancy
neighbouring pixels
pubcrawl
resilience
KHAZAD cipher
Secure Force (SF)
secure IoT
Secure IoT (SIT)
small battery operated devices
spatio-temporal correlation
Spatiotemporal phenomena
video data
video signal processing
efficient encryption
Ciphers
composability
conventional encryption methods
Correlation
correlation methods
Cryptography
Cyber Physical System
cyber physical systems
Cipher
efficient video encryption
encryption
encryption algorithm
Entropy
highly complex encryption process
Histograms
Internet of Things
IoT environment
biblio
Secure Equality Testing Protocols in the Two-Party Setting
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
composability
Cyber Physical System
cyber physical systems
efficiency
efficient encryption
equality test
Homomorphic encryption
privacy
Processing encrypted data
pubcrawl
resilience
Resiliency
biblio
LevelTree: A New Scalable Data Center Networks Topology
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
shortest path
LevelTree
network topology
new scalable data center network topology
pubcrawl
resilience
Resiliency
Scalability
Servers
Jellyfish
telecommunication network routing
telecommunication network topology
topological properties
Topology
tree topology
Vegetation
VolvoxDC
Data Center Network(DCN)
Bisection Bandwidth
cloud based applications
computer centres
computer networks
Control Theory
critical topologies
Cyber Physical System
cyber physical systems
Bandwidth
data centers
DCN topology
Diameter of graph
Fattree
graph theory
high bisection bandwidth
Human behavior
biblio
Traffic State Estimation with Big Data
Submitted by grigby1 on Mon, 12/16/2019 - 3:59pm
Control Theory
Cyber Physical System
cyber physical systems
HMM
Human behavior
pubcrawl
resilience
Resiliency
Scalability
SEA
System State Network
Traffic State Estimation
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »