Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Scalability
biblio
Optimal Selection of Cryptographic Algorithms in Blockchain Based on Fuzzy Analytic Hierarchy Process
Submitted by
aekwall
on Mon, 01/18/2021 - 10:35am
security
Scalability
Computational efficiency
data privacy
Hardware
Resiliency
pubcrawl
Cryptography
Metrics
blockchain
Distributed databases
analytic hierarchy process
cryptocurrencies
fuzzy set theory
cryptographic algorithms
AES
financial data processing
asymmetric cryptographic algorithms
ECDSA
experts grading method
FAHP
fuzzy analytic hierarchy process
SHA256
suitable cryptographic algorithm
symmetric cryptographic algorithms
Fuzzy Cryptography
biblio
A Fuzzy String Matching Scheme Resistant to Statistical Attack
Submitted by
aekwall
on Mon, 01/18/2021 - 10:35am
Bloom filter
Cloud Computing
Cryptography
data structures
Encrypted Cloud Database
encryption
frequency distribution
Fuzzy Cryptography
Fuzzy Query
fuzzy query scheme
fuzzy set theory
fuzzy string matching scheme
Indexes
Metrics
noise vector
pubcrawl
query processing
Resiliency
Resistance
S-BF
Scalability
secure fuzzy query
statistical attack
string matching
vector index
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by
aekwall
on Mon, 01/18/2021 - 10:34am
field programmable gate arrays
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
counterfeiting
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
Hamming distance
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
medium-range FPGA device
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
biblio
Dynamic Model of Cyber Defense Diagnostics of Information Systems With The Use of Fuzzy Technologies
Submitted by
aekwall
on Mon, 01/18/2021 - 10:34am
cyberattack
Scalability
Cryptography
Task Analysis
information security
Resiliency
pubcrawl
Metrics
Cybersecurity
Trojan horses
Fuzzy logic
probability
fuzzy set theory
security level
Information systems
information system
cyberattacks
differential equations
cryptographic level
cyber defense diagnostics
cyber defense systems
cyberattack intensity
cybersecurity status
delayed differential equation theory
dynamic model
fuzzy function
fuzzy technologies
information activity
logical fuzzy function
membership function
negative consequence probability
probability distribution density.
security status diagnosis
Fuzzy Cryptography
biblio
Encrypted Keyword Search in Cloud Computing using Fuzzy Logic
Submitted by
aekwall
on Mon, 01/18/2021 - 10:34am
Cloud Computing
Scalability
Servers
Keyword search
authorisation
Cryptography
data confidentiality
encryption
data encryption
Resiliency
pubcrawl
Metrics
query processing
Data protection
Fuzzy logic
fuzzy set theory
Indexes
information management
search engines
sensitive information
vital information
cloud service providers
complex Boolean queries
encrypted keyword search
fuzzy keyword search
Fuzzy Keyword Sets
information management professionals
keyword privacy
keyword safety
N-grams
Privacy Preserving Fuzzy Search
user document protection
Fuzzy Cryptography
biblio
Improving Data Privacy Using Fuzzy Logic and Autoencoder Neural Network
Submitted by
aekwall
on Mon, 01/18/2021 - 10:33am
security
Scalability
Cryptography
data privacy
electronic health records
Organizations
Resiliency
pubcrawl
privacy
Metrics
Autoencoder Neural Network
neural nets
Fuzzy logic
Biological neural networks
health care
hospitals
stored data
privacy breach
autoencoder
fuzzy logic membership functions
health sectors
privacy preserving techniques
Fuzzy Cryptography
biblio
Training Neural Network Over Encrypted Data
Submitted by
aekwall
on Mon, 01/18/2021 - 10:27am
Scalability
Cryptography
encrypted data
encryption
learning (artificial intelligence)
Resiliency
pubcrawl
Metrics
pattern classification
Training
convolutional neural nets
convolutional neural networks
Image color analysis
neural network
image classification
convolutional classifier
convolutional neural network classifier
image data encryption
image permutation
plain data
private company policy
Fuzzy Cryptography
biblio
BBS: Micro-Architecture Benchmarking Blockchain Systems through Machine Learning and Fuzzy Set
Submitted by
aekwall
on Mon, 01/18/2021 - 10:27am
Scalability
Cryptography
Protocols
computer architecture
learning (artificial intelligence)
machine learning
Resiliency
pubcrawl
Peer-to-peer computing
Metrics
blockchain
Performance
Distributed databases
Measurement
fuzzy set theory
Software Architecture
Benchmark testing
Traceability
Fabrics
decentralization
BBS
Benchmarking
Blockbench
Caliper
irreversibility
micro architecture
microarchitecture benchmarking blockchain systems
Workload Characterization
Fuzzy Cryptography
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by
aekwall
on Mon, 01/18/2021 - 10:26am
IoT
Scalability
Cryptography
data privacy
Internet of Things
Resiliency
pubcrawl
privacy
Metrics
authentication
message authentication
password
smart cards
Logic gates
ECC
IoT environments
Smart card
authentication scheme
fuzzy extractor
complementary elements
insider attack
key establishment
LightPriAuth
negative horizon
popular attacks
Privacy.
use cases
user anonymity
user authentication
Fuzzy Cryptography
biblio
Fuzzy Extractor-Based Key Agreement for Internet of Things
Submitted by
aekwall
on Mon, 01/18/2021 - 10:26am
Scalability
Cryptography
Internet of Things
feature extraction
Resiliency
pubcrawl
Metrics
authentication
fuzzy set theory
public key cryptography
sensors
biometrics (access control)
Reed-Solomon codes
data exchange
secure authentication
fuzzy extractor
Hamming codes
Biometric cryptosystem
computation times
effective key agreement scheme
fuzzy extractor-based key agreement
fuzzy vault principle
IoT actors
key agreement
recognition rate results
Reed Solomon codes
transmission data
Fuzzy Cryptography
1
2
3
4
5
6
7
8
9
…
next ›
last »