Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy protection
biblio
Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
white-box attacks
white box cryptography
white-box attack contexts
wearabledevices
wearable consumer electronic devices
wearable computing
random secret components
random padding
physical nature
low computational power
limited memory
lightweight white box encryption scheme
decryption algorithms
Consumer electronics
Cryptography
cryptosystem
wearable computers
Wearable devices
Context
privacy protection
pubcrawl
Data mining
Metrics
composability
Resiliency
performance evaluation
encryption
biblio
A Security Model for the Enhancement of Data Privacy in Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 11:05am
Scalability
user privacy in the cloud
internet acts
cyberspace data
Access Control
security model
data integrity
data confidentiality
privacy protection
Ciphers
Cloud Computing
Metrics
pubcrawl
Resiliency
Organizations
data privacy
encryption
Data Security
Cryptography
biblio
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge
Submitted by grigby1 on Fri, 07/03/2020 - 5:05pm
smart surveillance
privacy
privacy protection
pubcrawl
real-time video analytics
resilience
Resiliency
Scalability
secure privacy-preserving solution
policy-based enforcement
surveillance cameras
Transforms
video access sanctioning
video signal processing
video surveillance
video surveillance system security
VSS security
edge devices
blockchain technologies
Cryptography
data privacy
Data protection
Deterrence
Distributed databases
edge detection
edge device
blockchain security
federated blockchain network
Human behavior
Internet of Things
Lib-Pri system transforms
lightweight blockchain
lightweight privacy-preserving solution
Off-Site Storage
biblio
Privacy-Preserving Outsourcing Computation of QR Decomposition in the Encrypted Domain
Submitted by grigby1 on Fri, 07/03/2020 - 4:55pm
Metrics
tools
Somewhat Homomorphic Encryption
Signal processing in encrypted domain
QR decomposition
pubcrawl
privacy-preserving outsourcing computation
privacy protection
privacy
outsourced QR decomposition
Compositionality
Matrix decomposition
homomorphic encrypted domain
Gram-Schmidt process
Gram Schmidt process
encryption
decomposition
data privacy
cyber physical systems
Cryptography
biblio
A Topology Based Differential Privacy Scheme for Average Path Length Query
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Erbium
topology based differential privacy scheme
query function
privacy control parameters
node privacy protection
network vertices
edge-weighted privacy protection
differential privacy security mechanism
data query
average path length query
APL query
network topology
Euclidean distance
Scalability
Perturbation methods
Sensitivity
privacy protection
differential privacy
query processing
data availability
privacy
composability
pubcrawl
Human behavior
Resiliency
data privacy
biblio
A Differential Privacy Random Forest Method of Privacy Protection in Cloud
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
Decision trees
random forest classification algorithm
random forest algorithm
hybrid decision tree algorithm
high privacy protection
high classification performance
differential privacy random forest method
differential privacy protection
Forestry
classification accuracy
privacy protection
differential privacy
Cloud Computing
Prediction algorithms
pattern classification
privacy
composability
pubcrawl
Human behavior
Resiliency
Random Forest
Classification algorithms
data privacy
Scalability
biblio
Dynamic Data Publishing with Differential Privacy via Reinforcement Learning
Submitted by aekwall on Mon, 06/22/2020 - 11:19am
differential privacy
privacy guarantee
privacy budget allocation scheme
privacy budget allocation phase
privacy budget
dynamic data publishing strategy
dynamic data publishing algorithm
dynamic data
data release
data publishing
Publishing
privacy protection
Scalability
Heuristic algorithms
resource allocation
Reinforcement learning
resource management
privacy
composability
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
data privacy
biblio
An Identity Privacy Protection Strategy in Vehicle Named Data Network
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
malicious nodes
vehicular ad hoc networks
vehicle opportunity network
vehicle named data network
Security analysis
Scalability
ring signature scheme
Resiliency
resilience
pubcrawl
privacy protection
privacy problems
ONE-based VNDN platform
Named Data Network Security
anonymity
internet
interest packages
Identity Security
identity privacy protection strategy
identity information
Human behavior
digital signatures
data requester
data provider
data privacy
data packets
data names
computer network security
biblio
SEAF: A Secure, Efficient and Accountable Access Control Framework for Information Centric Networking
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
privacy protection
service accountability
Secure
SEAF
next-generation network
network resources
network edge
in-network cache
efficient and accountable access control framework
effective access control mechanism
delivery service
content providers
content delivery
cache-enabled routers
network accountability
cache storage
computer network security
ICN
information centric networking
delays
authentication
internet
Metrics
privacy
composability
pubcrawl
Resiliency
data privacy
Access Control
encryption
Cryptography
authorisation
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »