Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy preservation
biblio
A Survey on Trust Evaluation in Mobile Ad Hoc Networks
Submitted by grigby1 on Mon, 06/05/2017 - 12:44pm
collaboration
composability
Human behavior
MANET
MANET security
Metrics
privacy preservation
pubcrawl
Resiliency
Scalability
trust evaluation
Trust management
biblio
Efficient Privacy-preserving Schemes for Dot-product Computation in Mobile Computing
Submitted by grigby1 on Mon, 06/05/2017 - 12:41pm
Ad hoc networks
blind signature
Data Security
dot-product calculation
Human behavior
manet privacy
privacy preservation
pubcrawl
Repudiation
Resiliency
Scalability
biblio
A Utility Maximization Framework for Privacy Preservation of User Generated Content
Submitted by grigby1 on Mon, 06/05/2017 - 12:29pm
collaboration
data deletion
Human behavior
privacy preservation
pubcrawl
Scalability
user generated content
biblio
Elxa: Scalable Privacy-Preserving Plagiarism Detection
Submitted by grigby1 on Tue, 05/30/2017 - 12:56pm
Applied cryptography
collaboration
composability
Human behavior
Metrics
peer to peer security
plagiarism detection
privacy preservation
private record linkage
pubcrawl
Resiliency
Scalability
secure multi-party computation
biblio
SecHOG: Privacy-Preserving Outsourcing Computation of Histogram of Oriented Gradients in the Cloud
Submitted by grigby1 on Tue, 05/30/2017 - 12:49pm
cloud
composability
HOG
Metrics
object oriented security
outsourcing computation
privacy preservation
pubcrawl
Resiliency
biblio
Scalable Local-Recoding Anonymization Using Locality Sensitive Hashing for Big Data Privacy Preservation
Submitted by grigby1 on Mon, 04/24/2017 - 11:41am
Human behavior
Security Metrics
Resiliency
pubcrawl
privacy preservation
Metrics
MapReduce
LSH
in the cloud
Big Data
hash algorithms
Computing Theory
composability
cloud
big data securityComputing Theory
big data security
big data privacy
biblio
Privacy Principles for Sharing Cyber Security Data
Submitted by grigby1 on Thu, 02/23/2017 - 2:26pm
pubcrawl170106
organizational risk
Organizations
personal information exposure
poker queries
privacy
privacy balancing
privacy preservation
privacy principles
privacy risks
organizational boundaries
qualitative evaluation
queries
query processing
risk management
security information
security of data
trust requirements
Trusted Computing
engineering approaches
computer security
cyber security
cyber security data sharing
data confinement
data exposure
data privacy
data sharing
Distributed databases
distributed security system
business data processing
forward progress
internal information
Law
least disclosure
minimal requisite fidelity
moderated queries
network traffic
organisational aspects
biblio
"DIVa: Decentralized identity validation for social networks"
Submitted by grigby1 on Thu, 02/23/2017 - 12:05pm
learning (artificial intelligence)
user profile attribute
social networking (online)
Social network services
security
real-world OSN dataset
pubcrawl170105
Privacy-preserving Learning
privacy preservation
privacy
online social network
mining technique
association rules
fine-grained community-aware correlation
Ensemble Learning
DIVa
Decentralized Online Social Networks
decentralized learning approach
decentralized identity validation
data privacy
Data mining
Correlation
Computational modeling
Community-aware Identity Validation
biblio
"Privacy preserving of two sixteen-segmented image using visual cryptography"
Submitted by grigby1 on Thu, 02/23/2017 - 11:42am
privacy preservation
visualization
visual cryptography
unauthorized access
text analysis
statistical test
statistical analysis
sixteen-segmented text image
secret sharing
pubcrawl
16-segment display
information security
image segmentation
document image processing
Data Security
pubcrawl170105
data privacy
Cryptography
authorisation
Algorithm design and analysis
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
« first
‹ previous
1
2
3
4
5
6
next ›
last »