Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy preservation
biblio
Preserving the Anonymity in MobilityFirst networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
mobile computing
user anonymity
Trusted Computing
trust issues
three-tiered approach
telecommunication security
telecommunication network routing
Routing protocols
Routing
routers
Public key
privacy preservation
privacy
MobilityFirst networks
AMF
MF networks
internet
GUID
GNRS
globally unique flat identifier
global name resolution service
future Internet architecture
data privacy
computer science
authorisation
anonymity preservation
anonymity in MobilityFirst
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 9:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
biblio
Data mining for privacy preserving association rules based on improved MASK algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 9:27am
Itemsets
Time complexity
security issues
scanning database
query processing
privacy preserving association rules
privacy preservation
multi-parameters perturbation
mining associations with secrecy konstraints
matrix algebra
Algorithm design and analysis
inverse matrix
information privacy
improved MASK algorithm
DPQR algorithm
data privacy
data perturbation strategy
data perturbation and query restriction
Data mining
association rules
biblio
An energy-efficient routing technique for privacy preservation of assets monitored with WSN
Submitted by BrandonB on Mon, 05/04/2015 - 1:46pm
phantom source
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
telecommunication power management
Routing protocols
Routing
privacy preservation
privacy
Phantoms
asset monitoring
phantom node
Monitoring
fake packet injection technique
energy efficient routing technique
energy conservation
endangered species monitoring
delays
data privacy
Base stations
base station
biblio
Cloud Password Manager Using Privacy-Preserved Biometrics
Submitted by BrandonB on Thu, 04/30/2015 - 1:48pm
password leakage risk
web services
Web service account
untrusted cloud service providers
Trusted Computing
token authentication
Synchronization
security
privacy-preserved biometrics
privacy preservation
privacy enhanced biometrics
privacy
password storage
password manager
authorisation
nonbiometric password manager
master password based security
local password manager client synchronization
distributed service providers
data privacy
Cryptography
cloud password manager
Cloud Computing
cloud
biometrics based authentication
biometrics (access control)
biometrics
authentication
« first
‹ previous
1
2
3
4
5
6