Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
Towards Secure and Dependable Authentication and Authorization Infrastructures
Submitted by BrandonB on Mon, 05/04/2015 - 2:47pm
intrusion-tolerant replication
untrusted gateways
trusted components
software fault tolerance
Servers
security
resilience architecture
RADIUS
Public key
Protocols
OpenID
Logic gates
IT infrastructures
authentication
intrusion tolerance
fault-free executions
enterprise environments
diverse computing environments
dependability
authorization infrastructures
authorisation
authentication security
authentication infrastructures
authentication dependability
authentication and authorization services
biblio
Efficient configuration of monitoring slices for cloud platform administrators
Submitted by BrandonB on Mon, 05/04/2015 - 2:41pm
Measurement
web services
Time factors
system monitoring
Servers
Scalability
monitoring server load
monitoring configuration
Monitoring
automation techniques
load balancing
infrastructure-as-a-service
Indium phosphide
IaaS
FlexACMS response time
cloud slices
cloud environments
Cloud Computing
biblio
Cyber Scanning: A Comprehensive Survey
Submitted by BrandonB on Mon, 05/04/2015 - 2:40pm
Network reconnaissance
Cyber scanning
cyber scanning technique
Cyberspace
distributed cyber scanning detection method
enterprise networks
internet
Internet wide services
Monitoring
Protocols
Ports (Computers)
Probes
Probing
Probing campaigns
Scanning events
security of data
Servers
targeted cyber attack
biblio
An anonymous payment system to protect the privacy of electric vehicles
Submitted by BrandonB on Mon, 05/04/2015 - 2:15pm
Energy Provider Company
vehicles
Trusted Platform Module
Trusted Computing
tpm
Servers
secondary cells
Registers
recharging service
recharging infrastructure
Protocols
privacy protection
privacy
financial management
EPC
anonymous credential technique
electrical energy
Electric Vehicles
driver privacy
driver information systems
double spending detection
data privacy
Cryptography
battery powered vehicles
battery
batteries
automobile
authentication
anonymous payment system
biblio
Preserving location privacy based on distributed cache pushing
Submitted by BrandonB on Mon, 05/04/2015 - 2:10pm
markov chain
Trajectory
Servers
privacy
mobility management (mobile radio)
mobile users
mobile computing
Mobile communication
Markov processes
cache storage
location privacy preservation scheme
location privacy
location based service
Distributed databases
distributed cache pushing
data privacy
computer architecture
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 2:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
Design and implementation of a mobile VoIP system on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:37pm
Mobility
VoIP service
VoIP
true mid-call mobility
sockets
socket communications
smart phones
signaling procedure
Servers
Protocols
pre-call mobility
Peer-to-peer computing
peer entity
moving users
mobility management (mobile radio)
android
mobile VoIP system
mobile users
IP networks
Internet telephony
in band signaling
graphical user interfaces
encryption
DNS
Cryptography
buffering techniques
ASP technology
Androids
Android devices
Android (operating system)
biblio
Achieving privacy preservation in WiFi fingerprint-based localization
Submitted by BrandonB on Mon, 05/04/2015 - 1:23pm
location privacy
wireless LAN
WiFi fingerprint-based localization
smart phones
signal strengths
Servers
real-world environments
PriWFL
privacy-preserving WiFi fingerprint localization scheme
privacy
performance enhancement algorithm
mobile computing
Accuracy
localization service provider
indoor mobility prediction
indoor localization
IEEE 802.11 Standards
Homomorphic encryption
Databases
data privacy
Cryptography
computer network security
computational overhead reduction
Android smartphone
biblio
Effective personalized mobile search using KNN
Submitted by BrandonB on Mon, 05/04/2015 - 1:20pm
KNN
Vectors
user preferences
user preference privacy
Servers
search engines
personalized mobile search
personalization
pattern classification
Ontology
Ontologies
mobile search engine
mobile computing
Mobile communication
location search
Android based mobile
k nearest neighborhood
information retrieval
encryption techniques
data privacy
data maintaining security
Cryptography
concept extraction
concept
client-server systems
client-server architecture
clickthrough data
Classification algorithms
classification
Androids
« first
‹ previous
…
86
87
88
89
90
91
92
93
94
next ›
last »