Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resists
biblio
An Evaluation of Lower Facial Micro Expressions as an Implicit QoE Metric for an Augmented Reality Procedure Assistance Application
Submitted by aekwall on Mon, 03/01/2021 - 4:47pm
microfacial expressions
complex procedure assistance
continuous QoE metric
continuously infer user QoE
ergonomics
implicit metrics
implicit QoE metric
lower facial microexpressions
micro facial expression
augmented reality procedure assistance application
normal expressions
paper-based procedure assistance control
procedure assistance AR applications
repeatable procedures
traditional accepted post-experience
user acceptability
user quality
work factor metrics
Resists
Task Analysis
mobile computing
Resiliency
pubcrawl
Measurement
statistical analysis
Cameras
Human Factors
Scalability
computer vision
Videos
emotion recognition
face recognition
augmented reality
quality of experience
affective state
AR application
biblio
Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking
Submitted by aekwall on Mon, 02/22/2021 - 1:35pm
Synergetic Denial-of-Service
named data networking
network architecture
normal IFAs
pubcrawl
Resiliency
Resists
Scalability
SDoS attacks
security of data
IP networks
telecommunication network routing
telecommunication network topology
telecommunication security
telecommunication traffic
underwater acoustic communication
underwater sensor networks
UWSN
wireless sensor networks
denial-of-service attack
security
attacker identification
attackers synergize
computer network security
computer science
Data Transmission
delays
Denial-of-Service
Underwater Networks
denial-of-service attacks
DoS attacks
future network architectures
Human behavior
increased network traffic
Interest Flooding Attack
interest flooding attacks
internet
biblio
Key Generation for Zero Steganography Using DNA Sequences
Submitted by aekwall on Mon, 02/08/2021 - 1:52pm
flipping operations
image sequences
DNA cryptography
DNA sequences
steganalysis algorithms
cover image
binary code representation
Boats
DNA key generation
Steganography
Image databases
image synthesis
key generation algorithm
low cracking probability
shifting operations
steganographic approach
stego-key generation
zero steganography
privacy
Runtime
security
information security
Resiliency
Human behavior
pubcrawl
data encapsulation
Image coding
Cryptography
probability
DNA
image representation
Resists
object detection
Predictive Metrics
data hiding
Binary codes
biblio
Enhanced p-Sensitive k-Anonymity Models for Achieving Better Privacy
Submitted by grigby1 on Thu, 01/28/2021 - 1:59pm
Metrics
skew attacks
sensitive groups
sensitive attacks
Resists
Resiliency
resilience
Publishing
pubcrawl
Privacy Requirements
privacy
personalized protection characteristic
personalized privacy protection
Partitioning algorithms
one size fits all unified privacy protection level
anonymity
Human behavior
homogeneous attacks
faces
enhanced p-sensitive k-anonymity models
enhanced anonymous models
data utility
data publishing
data privacy
Data models
data anonymity
composability
Clustering algorithms
clustering
biblio
A Novel Anti-Collusion Audio Fingerprinting Scheme Based on Fourier Coefficients Reversing
Submitted by grigby1 on Wed, 01/20/2021 - 4:09pm
Media
Fingerprint recognition
Fourier coefficients
Fourier transform
Fourier transforms
frequency-domain analysis
Human behavior
illegal redistributed audio copies
illegal redistribution
Data Security
multimedia computing
multimedia fingerprinting coding
pubcrawl
resilience
Resiliency
Resists
security of data
Acoustic Fingerprints
Data protection
data hiding
data encapsulation
copyright
computer security
composability
colluded audio
audio signal
audio quality
audio fingerprint
audio copyright protection
audio coding
anticollusion audio fingerprinting
Anti-collusion
Acoustic signal processing
biblio
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access
Submitted by aekwall on Mon, 12/14/2020 - 12:43pm
dynamic spectrum access
Tsunami
Truthful user Sybil-proof aUctioN mechAnisM
Sybil-proof spectrum auction mechanisms
spectrum shortage problem
spectrum allocation efficiency
single secondary user
sequential matching approach
primary user Sybil-proof aUctioN mechAnisM
online spectrum auction
onlIne spectrum allocation
cost-efficient SUs
bid-independent sorting method
2D truthfulness
Resiliency
Cost accounting
DSA
electronic commerce
Resists
radio networks
Interference
Metrics
Wireless communication
resource management
sybil attacks
composability
pubcrawl
biblio
Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall
Submitted by aekwall on Mon, 10/19/2020 - 12:07pm
compromised machine
KP-ABE
Key Policy Attribute Based Encryption (KP-ABE)
Stephen-Davidowitz
nontrivial combining nonmonotonic formula
nonmonotonic access structure
non-monotonic access structure
multiauthority nonmonotonic KP-ABE scheme
multiauthority key-policy ABE scheme
multiauthority ABE scheme
Multi-authority
MA-KP-ABE-CRF system
ex-filtration
cryptographic reverse firewall concept
cryptographic reverse firewall
CRF security protection
firewalls
Charm library
attribute-based encryption field
attribute-based encryption
formal security analysis
Resists
Firewalls (computing)
pubcrawl
Resiliency
Protocols
secret keys
Access Control
encryption
Cryptography
Scalability
biblio
Secure Authentication Mechanism for Resistance to Password Attacks
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
Dictionaries
brute force attacks
shoulder surfing
password based authentication mechanism
password attacks
matrix based secure authentication mechanism
Matrix based authentication
key stroke technique
graphichical password technique
dictionary attacks
click pattern technique
Brute forcing
Cryptography
Resists
matrix algebra
policy-based governance
Human Factors
password
Force
pubcrawl
authentication
Indexes
authorisation
biblio
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
multiauthority CP-ABE scheme
cryptographic applications
cryptographic technology
data confidentiality
flexible threshold access policy
generic lattice
ideal lattice
Multi-authority
multiauthority ciphertext policy
Ciphertext policy attribute-based encryption
multiple attribute authorities
post-quantum era
quantum attacks
R-LWE
ring learning with errors
virtual attributes
collaboration
Cryptography
bilinear maps
fine-grained access control
Resists
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
encryption scheme
CP-ABE
Lattices
policy-based governance
pubcrawl
Cloud Computing
Scalability
data privacy
authorisation
Access Control
encryption
biblio
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
central authority
collaboration
user collusion avoidance
Resists
privacy-preserving decentralized KP-ABE
key policy
decisional bilinear Diffie-Hellman assumption
decentralized KP-ABE scheme
decentralized KP ABE scheme
decentralized key policy ABE schemes
Decentralized attribute-based encryption
DBDH assumption
collusion attack
encryption
attributed-based encryption
KP-ABE
key policy attribute based encryption
policy-based governance
pubcrawl
public key cryptography
Generators
privacy
Scalability
Public key
data privacy
authorisation
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »