Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
homomorphic encryption scheme
biblio
Securing data forwarding against blackhole attacks in mobile ad hoc networks
Submitted by
grigby1
on Mon, 01/21/2019 - 11:31am
pubcrawl
Metrics
Resiliency
telecommunication security
Cryptographic Protocols
encryption
packet delivery ratio
Routing protocols
Compositionality
Receivers
ad hoc on-demand multipath distance vector protocol
AOMDV protocol
Blackhole attack
blackhole attacks
blackhole nodes
data communication
data forwarding security
data transmission security
homomorphic encryption scheme
MANET
mobile ad hoc network
mobile ad hoc network security
mobile ad hoc networks
mobile nodes
multi-path routing
network throughput
secure message transmission
Ad Hoc Network Security
biblio
Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing
Submitted by
grigby1
on Wed, 11/14/2018 - 12:13pm
auditing
Cloud Auditing
Cloud Computing
Compositionality
Cryptography
data privacy
encoding
encryption
encryption audits
generic algorithm
homomorphic encryption scheme
Metrics
predominant cloud auditing use cases
privacy
privacy enhancing approach
privacy enhancing mechanisms
pubcrawl
Public key
public key version
relevant crypto parameters
resilience
Resiliency
Security Audits
Semiautonomic cloud auditing architecture
SHE parameters
Software Acceleration
Somewhat Homomorphic Encryption
telecommunication security
use case scenario
Weaving
biblio
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
Submitted by
grigby1
on Mon, 11/27/2017 - 11:06am
Cloud Computing
Cloud Security
composability
compute complexity
data privacy
Data Security
Elliptic curve cryptography
Elliptic curve cryptography (ECC)
Elliptic curves
encrypted outsourcing data
encryption
GPS data
GPS data of the earthquake
Homomorphic encryption
homomorphic encryption scheme
Metrics
plain text attack
privacy protection
pubcrawl
public environments
public key cryptography
Resiliency
secure multiparty computation
semantic security
trusted third party
TTP
user privacy data protection