Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Public key
biblio
A Secure and Decentralized Reconfiguration Protocol For Sharding Blockchains
Submitted by grigby1 on Tue, 05/24/2022 - 1:51pm
fault tolerance
sharding blockchain
reconfiguration
Proof-of-work
Byzantine Fault Tolerance
decentralization
Public key
Compositionality
Metrics
Fault tolerant systems
blockchain
composability
Information Assurance
Big Data
Protocols
Conferences
Resiliency
resilience
Human behavior
pubcrawl
biblio
Secure Cloud Data Deduplication with Efficient Re-Encryption
Submitted by grigby1 on Mon, 05/09/2022 - 4:37pm
Public key
REED
data deduplication
AONT
user privacy in the cloud
RSA
Scalability
cloud
Metals
computer architecture
Redundancy
Access Control
data privacy
Resiliency
resilience
pubcrawl
Cloud Computing
encryption
biblio
Certificateless Public Auditing Scheme with Data Privacy Preserving for Cloud Storage
Submitted by grigby1 on Mon, 05/09/2022 - 4:37pm
Cloud Computing
pubcrawl
resilience
Resiliency
data privacy
cloud storage
energy consumption
Public key
data integrity
Scalability
Privacy-preserving
storage management
user privacy in the cloud
CertificateLess cryptography
Lead acid batteries
remote data integrity checking
biblio
A Blockchain-Assisted Privacy-Preserving Cloud Computing Method with Multiple Keys
Submitted by grigby1 on Mon, 05/09/2022 - 4:36pm
Cloud Computing
Servers
pubcrawl
resilience
Resiliency
privacy
data privacy
Protocols
blockchain
privacy protection
Public key
Scalability
Homomorphic encryption
user privacy in the cloud
blockchains
multiple keys
biblio
Towards Efficient Co-audit of Privacy-Preserving Data on Consortium Blockchain via Group Key Agreement
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
privacy
data privacy
distributed ledger
Public key
pubcrawl
Resiliency
Industries
Compositionality
Prototypes
Fabrics
Predictive Metrics
privacy preservation
co-audit
consortium Blockchain
Group key agreement
encryption audits
biblio
EPF-CLPA: An Efficient Pairing-Free Certificateless Public Auditing for Cloud-based CPS
Submitted by aekwall on Fri, 05/06/2022 - 12:51pm
Cloud Computing
Servers
Public key
cloud storage
pubcrawl
Resiliency
Computational efficiency
Elliptic curve cryptography
Compositionality
Performance analysis
Predictive Metrics
Certificateless Auditing
Cyber Physical Systems (CPS)
Identity-based encryption
integrity
encryption audits
biblio
Data Security And Recovery Approach Using Elliptic Curve Cryptography
Submitted by grigby1 on Thu, 05/05/2022 - 2:19pm
Cloud Computing
composability
Cryptography
decryption
Elliptic curve cryptography
Elliptic curves
encryption
Metrics
pubcrawl
Public key
recovery
resilience
Resiliency
Scalability
Software
Transmitters
biblio
Secure Digital Signature Validated by Ambient User amp;\#x2019;s Wi-Fi-enabled devices
Submitted by grigby1 on Tue, 04/26/2022 - 2:50pm
public-key
Wi-Fi
validation
Servers
Seals
Scalability
RSSI
Resiliency
resilience
Receivers
digital signature
Public key
pubcrawl
private-key
Mobile handsets
information technology
email spoofing
Electronic mail
digital signatures
biblio
Eliminating Broadband Covert Channels in DSA-Like Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 3:13pm
data hiding
subliminal channel
Steganography
Scalability
Resiliency
resilience
Redundancy
Public key
pubcrawl
DSA
digital signatures
data communication
covert channels
covert channel
control systems
Compositionality
composability
channel capacity
Broadband communication
biblio
Dynamic Key Management Scheme for Clustered Sensor Networks with Node Addition Support
Submitted by grigby1 on Tue, 04/19/2022 - 10:40am
Public key
wireless sensor networks
wireless network
Wireless communication
sensor security
security
Scalability
Routing protocols
resilience
authentication
pubcrawl
Logic gates
key management
confidentiality
Communication system security
Clustered Sensor Network
batteries
1
2
3
4
5
6
7
8
9
…
next ›
last »