Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
non-repudiation
biblio
MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle
Submitted by grigby1 on Fri, 04/28/2023 - 12:49pm
non-repudiation
blockchain
pubcrawl
authentication
composability
real-time systems
smart contracts
Reliability
data communication
Data Transmission
Costs
multisignature
Social Internet of Vehicles (SIoV)
biblio
Blockchain Vulnerabilities and Recent Security Challenges: A Review Paper
Submitted by grigby1 on Fri, 04/14/2023 - 4:12pm
blockchain
blockchain security
blockchain threat
blockchain vulnerabilities
blockchains
Industries
non-repudiation
Peer-to-peer computing
pubcrawl
Resiliency
Scalability
security
Systematics
Technological innovation
biblio
A Novel Distributed CA System Based on Blockchain
Submitted by grigby1 on Fri, 02/03/2023 - 5:27pm
Scalability
secret key homomorphism of elliptic encryption algorithm
distributed CA
CPK
PKI Trust Models
blockchains
distributed storage
smart contracts
blockchain
encryption
Heuristic algorithms
Resiliency
resilience
Metrics
Human behavior
pubcrawl
non-repudiation
biblio
SM9 Digital Signature with Non-Repudiation
Submitted by grigby1 on Thu, 09/16/2021 - 11:10am
Metrics
SM9
Servers
Resiliency
resilience
Repudiation
pubcrawl
private key generation
non-repudiation
composability
Identity-based encryption
identity based cryptography
Human behavior
Homomorphic encryption
encryption
digital signatures
digital signature
computational intelligence
biblio
Federated Blockchain-Based Tracking and Liability Attribution Framework for Employees and Cyber-Physical Objects in a Smart Workplace
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
object behaviour
defence-in-depth strategy
Digital Witness
digital witnesses
DW
emerging concept
empirical data
employees
federated blockchain model
federated blockchain-based tracking
forensic-readiness
Incident Response
Insider threart
liability attribution framework
modern digital forensics
data collection capabilities
operational efficiency
proactive insider threat detection
Process Automation
real-life case study
SCBE
security-by-design framework
smart building
Smart City
smart controlled business environments
smart SPS objects
smart workplace
systematic integration
Repudiation
Bluetooth
Monitoring
Internet of Things
cyber-physical systems
Resiliency
Human behavior
pubcrawl
composability
Metrics
Supply Chain
organisational aspects
Anomaly Detection
Digital Forensics
cryptocurrencies
IoT
Insider Threats
business data processing
Threat Landscape
Artificial Intelligence
CPS
non-repudiation
authenticity
behavioural patterns
Bluetooth-based proximity monitoring solution
businesses
chain-of-custody
complexities
cyber-physical objects
biblio
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
file access patterns
Repudiation
violation scheme
tree structure
tree nodes
tree construction algorithm
service-level agreement
real-time proof
proof of violation
PoV scheme
non-repudiation
Huffman coding
Huffman codes
hash tree
file system
Cloud Computing
cryptographic proofs
cloud storage service
adaptive Huffman coding hash tree
service provider
tree data structures
storage management
data compression
trees (mathematics)
Metrics
composability
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Mirage: A Protocol for Decentralized and Secured Communication of IoT Devices
Submitted by aekwall on Mon, 02/24/2020 - 10:56am
IoT
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
authentication
integrity
decentralization
non-repudiation
Repudiation
biblio
Prominence Of ECDSA Over RSA Digital Signature Algorithm
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
Human behavior
RSA Digital Signature Algorithm
RSA
Resiliency
resilience
Repudiation
public key cryptography
public key cryptographic algorithms
pubcrawl
non-repudiation
Metrics
composability
handwriting recognition
Elliptical Curve Digital Signature Algorithm
Elliptic curves
Elliptic curve cryptography
ECDSA
ECDLP
ECC
digital signatures
cryptosystem
Conferences
biblio
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
provable data possession
Metrics
non-repudiation
nonrepudiable PDP scheme
nonrepudiable provable data possession scheme
nonrepudiation issue
outsourced data
private auditability
private verifier
human factor
pubcrawl
Repudiation
resilience
Resiliency
security
Servers
storage management
associated tags
Human behavior
DV-PDP schemes
digital signatures
designated verifier
Data models
Data mining
data integrity
concrete DV-NRPDP scheme
Computational modeling
composability
cloud storage systems
cloud storage server
cloud storage
Cloud Computing
Cascading style sheets
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
1
2
next ›
last »