Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
encryption
biblio
A New Homomorphic Message Authentication Code Scheme for Network Coding
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
encryption
pubcrawl
Metrics
resilience
Resiliency
message authentication
telecommunication security
authentication
composability
encoding
access protocols
network coding
Pollution
homomorphic mac
homomorphic MAC scheme
homomorphic message authentication code
known-plaintext attacks
MAC length
network data flow
packet decoding
pollution attacks
security parameter
some what homomorphic encryption
vector length
biblio
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution
Submitted by aekwall on Mon, 02/22/2021 - 12:43pm
Servers
Cryptography
encryption
nearest neighbour methods
pubcrawl
query processing
Databases
Measurement
database management systems
estimation
Predictive Metrics
Histograms
encrypted databases
Approximation algorithms
data distribution
nearest neighbor search
range queries
distribution-agnostic reconstruction attacks
first value reconstruction attacks
k-nearest-neighbor queries
k-NN attack
known structured encryption schemes
known value reconstruction attacks
leakage-abuse attacks
plaintext values
range attack
search tokens
search-pattern leakage
skewed query distributions
support size estimator
uniform query distribution
uniformly distributed queries
biblio
Group Key Management in Cloud for Shared Media Sanitization
Submitted by grigby1 on Tue, 02/16/2021 - 12:24pm
encryption
privacy
Cloud Computing
security
pubcrawl
Human behavior
resilience
Resiliency
Compositionality
Cloud Security
Media
cloud computing security
Handheld computers
Data Sanitization
Client-side Key Management Services
Crypto Shredding
grid computing
Key Management Services
Remote Key Management Services
biblio
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Submitted by aekwall on Mon, 02/15/2021 - 3:57pm
cryptographic hash functions
cryptographic tasks
decryption
derivation function
Electronic mail
Elliptic curve cryptography
elliptic curve discrete logarithm problem
Elliptic curves
encryption
Generators
hard number theoretic problems
Hash Function
Metrics
NIST
pseudorandom bit generator mechanism
pseudorandom bit generators
pubcrawl
public key cryptography
Random Bit Generator
random bit generator mechanism
random number generation
Resiliency
Scalability
secure hash function
security strengths
statistical testing
unpredictability properties
biblio
Video Steganography using Curvelet Transform and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
carrier video file
color video
cover video
Cryptography
curvelet transforms
discrete wavelet transforms
Elliptic curve cryptography
elliptic curve integrated encryption scheme
encryption
fast discrete curvelet transform
Image coding
Image Steganography
Mathematical model
Metrics
pubcrawl
public key cryptography
Resiliency
Scalability
secret data transmission
secure video steganography
security
Steganography
Stego Key
stego key encryption
stego video
Transforms
video steganography
biblio
Image Encryption Using Genetic Algorithm and Bit-Slice Rotation
Submitted by aekwall on Mon, 02/15/2021 - 3:51pm
bit plane rotation
Bit Plane Slice
bit plane slicing
bit-slice rotation
chaotic encryption
composability
Cryptography
cryptography attacks
cyber physical systems
digital image
efficient encryption
encryption
fully encrypted image
Generators
genetic algorithm
genetic algorithms
Genetics
Image coding
image encryption
image encryption algorithms
Indexes
pubcrawl
Resiliency
Sociology
SSIM
structural similarity index measure
biblio
Encryption algorithm based on knight’s tour and n-neighbourhood addition
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
composability
cover images
Cryptography
cyber physical systems
digital images
efficient encryption
encryption
encryption algorithm
image encryption
Image Processing
knight tour matrix
Knight's Tour Problem
Knight’s Tour Matrix
Knight’s Tour Problem (KTP)
KT matrix
matrix algebra
Matrix converters
n-neighborhood addition
n-neighbourhood addition
Partitioning algorithms
pubcrawl
Resiliency
signal processing
Signal processing algorithms
biblio
Privacy-Preserving and Efficient Sharing of Drone Videos in Public Safety Scenarios using Proxy Re-encryption
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
autonomous aerial vehicles
Cloud Computing
cloud storage
composability
Cryptography
cyber physical systems
data privacy
drones
efficient drone video sharing
efficient encryption
encryption
Intelligent Transportation Systems
law enforcement
Long Term Evolution
original encryption key
privacy
privacy concerns
privacy preserving
privacy-preserving Sharing
Proxy re-encryption
Proxy Reencryption
pubcrawl
public safety applications
public safety scenarios
realistic simulation environment
Resiliency
road safety
storage management
streaming
surveillance videos
trusted control center
Unmanned Aerial Vehicles
Video communication
video recording
video streaming
video surveillance
video transmission
Videos
biblio
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing
Submitted by aekwall on Mon, 02/15/2021 - 3:49pm
Broadcast Encryption
Broadcasting
Cloud Computing
Cloud Server Provider
cloud storage
composability
conditional proxy broadcast re-encryption technology
cyber physical systems
data encryption
data owner
data privacy
data sharing
dynamic cloud environment
dynamic conditional proxy broadcast re-encryption scheme
dynamic conditional proxy broadcast reencryption scheme
efficient encryption
encryption
fixed system user setup
Focusing
party proxy
Performance analysis
private key cryptography
Proxy re-encryption
pubcrawl
re-encrypted cloud data
re-encrypted data
Resiliency
Secure storage
Servers
sharing approaches
storage management
system user setting
target user group
telecommunication security
tools
user data
biblio
A Reversible Meaningful Image Encryption Scheme Based on Block Compressive Sensing
Submitted by aekwall on Mon, 02/15/2021 - 3:48pm
ABCS
adaptive block compressive sensing
Adaptive Block Compressive Sensing framework
carrier image
Ciphers
composability
compressed sensing
Correlation
Cryptography
cyber physical systems
efficiency performance
efficient encryption
efficient image encryption scheme
encryption
final meaningful cipher image
Image coding
image compression
Image reconstruction
least significant bit embedding
Logistics
meaningful image encryption
plain image
pubcrawl
Resiliency
reversible meaningful image encryption scheme
secret image
1
2
3
4
5
6
7
8
9
…
next ›
last »