Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Computational efficiency
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 10:35am
Algorithm
Cathode ray tubes
Complexity theory
computational cost
Computational efficiency
Cryptography
data privacy
decryption
decryption speed
encrypted data
encryption
fast decryption algorithm
fast decryption process
Homomorphic encryption
Human Factors
improved decryption process
Metrics
modular multiplicative arithmetic
paillier cryptosystem
Paillier homomorphic cryptosystem
Paillier homomorphic encryption scheme
pubcrawl
public-key cryptosystem
Resiliency
Scalability
storage paradigm
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
security
Scalability
Computational efficiency
data privacy
Hardware
Resiliency
pubcrawl
Cryptography
Metrics
blockchain
Distributed databases
analytic hierarchy process
cryptocurrencies
fuzzy set theory
cryptographic algorithms
AES
financial data processing
asymmetric cryptographic algorithms
ECDSA
experts grading method
FAHP
fuzzy analytic hierarchy process
SHA256
suitable cryptographic algorithm
symmetric cryptographic algorithms
Fuzzy Cryptography
biblio
Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Metrics
digital signatures
authentication
Compositionality
Computational efficiency
Asymmetric Encryption
ABAuth
asymmetric bilinear map
asymmetric case
asymmetric pairing
attribute based
attribute-based key-encapsulation mechanisum
BN curve
challenge and response
challenge-and-response protocol
concurrent man-in-the-middle security
one-way-CCA security
original ABKEM
Ostrovsky-Sahai-Waters
TEPLA library
type-3 pairing
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
encryption
Computational efficiency
decryption
Resiliency
Human behavior
pubcrawl
privacy
Metrics
Public key
public key cryptography
Security analysis
Compositionality
symmetric cryptography
network resources
Asymmetric Encryption
communication overhead
asymmetric cryptography
Cathode ray tubes
Chinese remainder theorem
chosen plaintext attack
dynamic networks
group membership changes
high computational cost
lightweight AMOUN
lightweight scalable multirecipient asymmetric cryptographic scheme
Multi-recipient Encryption
multiple recipients
MultiRSA
securing multiparty communication
biblio
Fast Bi-dimensional Empirical Mode based Multisource Image Fusion Decomposition
Submitted by grigby1 on Fri, 07/03/2020 - 3:54pm
BEMD method
bi-dimensional empirical mode decomposition
bi-dimensional intrinsic mode functions
BIMF
Compositionality
Computational efficiency
cyber physical systems
decomposition
details information
Empirical mode decomposition
fast bi-dimensional empirical mode decomposition
fixed neighborhood window method
Hermite interpolation
Hermite interpolation reconstruction method
Hilbert transforms
image decomposition
image fusion
Image reconstruction
interpolation
Market research
Metrics
microsoft windows
multisource image fusion decomposition
pubcrawl
source image features
surface interpolation
variable neighborhood window method
Wireless communication
biblio
Distributed Access Control with Outsourced Computation in Fog Computing
Submitted by aekwall on Mon, 01/20/2020 - 10:52am
Fog computing
security
Access Control
attribute based-encryption
Big Data
big data transmission
Cloud Computing
computational complexity
Computational efficiency
Cryptography
data storage
distributed access control
distributed processing
edge computing
encryption
fine-grained access control
Fog Computing and Security
fog device
Internet of Things
IoT
network terminal devices
outsourced computation
performance evaluation
pubcrawl
Resiliency
Scalability
security of data
traditional cloud computing
biblio
Cryptoanalyzing and Improving for Directed Signature Scheme and the Proxy Signature Scheme
Submitted by aekwall on Mon, 01/06/2020 - 9:37am
Scalability
digital signature
Computational efficiency
data privacy
private key cryptography
Resiliency
pubcrawl
digital signatures
public key cryptography
Security analysis
Elliptic curve cryptography
ECC
handwriting recognition
Computer security and privacy
cryptoanalysis
directed signature scheme
forward secure proxy signature
FoSPS
private key exposure
proxy signature scheme
public signature verification problem
biblio
A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion
Submitted by aekwall on Mon, 12/09/2019 - 11:22am
security of data
Cloud Computing
Internet of Things
security
Trusted Computing
pubcrawl
composability
Computational modeling
Reliability
Entropy
sensor fusion
edge computing
Compositionality
outsourcing
Computational efficiency
feedback information fusion algorithm
feedback trust
global trust calculation
information entropy
IoT edge computing applications
IoT edge computing architecture
IoT edge devices
largescale IoT edge computing
lightweight trust computing mechanism
lightweight trust evaluating mechanism
lightweight trust mechanism
low-overhead trust computing algorithms
multi-source feedback information fusion
multisource feedback information fusion
objective information entropy theory
outsourced computing services
reliable trust computing mechanism
trust calculation mechanism
trust computing mechanism
Computing Theory and Trust
biblio
Attribute-based proxy re-encryption method for revocation in cloud storage: Reduction of communication cost at re-encryption
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
Cloud Computing
Scalability
Servers
Access Control
Cryptography
Data Security
encryption
abe
advanced encryption standard
AES key
attribute-based encryption
Attribute-Based Encryption (ABE)
Big Data
cloud storage
communication cost
Computational efficiency
data owner
data privacy
easy storage
huge communication costs
hybrid encryption scheme
matching attributes
privacy concerns
Proxy re-encryption
proxy re-encryption method
revocation
revoked users
Syalim encryption scheme
symmetric encryption scheme
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
biblio
Hidden Process Detection for Windows Operating Systems
Submitted by grigby1 on Mon, 03/26/2018 - 11:58am
audit system
composability
Computational efficiency
data encapsulation
descriptor based method
hidden process detection
Indexes
information security monitoring
Libraries
Metrics
Microsoft Windows (operating systems)
Monitoring
monitoring system
opened windows based method
operating system kernels
PID based method
pubcrawl
resilience
Resiliency
rootkit
security
security of data
software development
system call based method
user mode
Windows operating system
1
2
next ›
last »