Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy protection
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
efficiency
privacy models and measurement
server security
Location-based social applications
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
query processing
security of data
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
query processing
privacy models and measurement
server security
Location-based social applications
location transformation
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
security of data
efficiency
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Research on Cloud Workflow Engine Supporting Three-Level Isolation and Privacy Protection
Submitted by grigby1 on Fri, 04/17/2020 - 10:24am
jBPM4 engine
workflow management software
workflow engine
virtualization privacy
three-level isolation
Resiliency
resilience
pubcrawl
privacy protection
privacy
Metrics
mass tenant workflow instances
business data processing
Java
Human Factors
Human behavior
data privacy
composability
cloud workflow systems
cloud workflow model
cloud workflow engine
cloud workflow
Cloud Computing
ceramic cloud service platform
biblio
Research on Privacy Protection with Weak Security Network Coding for Mobile Computing
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
network coding
Wireless fidelity
weak security network coding
telecommunication security
telecommunication network reliability
Servers
sensors
routing policy
Resiliency
resilience
pubcrawl
privacy protection
composability
mobile sensor networks
mobile computing
Metrics
information transmission process
information transfer mechanism
Homomorphic encryption
encryption
encoding
cyber physical systems
Cryptography
crowd sensing
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Policy-Based De-Identification Test Framework
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
Privacy Policies
pseudonymization
privacy protection
privacy preserving
privacy models
policy-based de-identification test framework
personal privacy anonymization
General Data Protection Regulation
Domain-Specific Language
domain specific language
Distributed Information Systems
data-centered society
privacy
Data protection
Load modeling
Big Data
data privacy
Data models
Scalability
performance evaluation
Generators
Human behavior
pubcrawl
biblio
Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
identity protection strategies
Privacy Policies
Stochastic game
protection game
privacy protection system
privacy protection
policy iteration algorithm
policy evaluation
personal identity information
optimal policy
Iterative methods
information dynamic
privacy
evaluation framework
dynamic identity ecosystem approach
Bayesian network mathematical representation
identity theft
Identity Ecosystem
Scalability
data privacy
Human behavior
pubcrawl
security of data
belief networks
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
User Privacy Protection for Cloud Computing Based Smart Grid
Submitted by grigby1 on Mon, 03/09/2020 - 2:58pm
security
power system reliability
power system security
privacy
privacy protection
pubcrawl
Reliability
resilience
Resiliency
Scalability
power engineering computing
Smart Grid
smart grid communication system
Smart Grid Privacy
Smart Grids
smart meter system
smart meters
smart power grids
user privacy protection
data security issue
Cloud Computing
collaboration
composability
Conferences
data chunk storage
data combination privacy
data insertion
data privacy
data searching
chunk relationship confusion
electric system efficiency
electric system reliability
electric system safety
electrical safety
Human behavior
Human Factors
Metrics
policy-based governance
biblio
The Privacy Case: Matching Privacy-Protection Goals to Human and Organizational Privacy Concerns
Submitted by grigby1 on Mon, 03/09/2020 - 2:57pm
Smart Grid
privacy goals
privacy protection
privacy-protection goals
privacy-related risks
pubcrawl
resilience
Resiliency
Safety
Scalability
privacy
smart grid data processing
Smart Grid Privacy
smart grid stakeholder
smart grid stakeholders
Smart Grids
smart power grids
Software Architecture
Stakeholders
goals structuring notation
Aspern Smart City Research project
automotive domain
Automotive engineering
Buildings
collaboration
composability
data privacy
goal structuring notation
argumentation thread
Human behavior
Human Factors
human privacy concern
Metrics
organizational privacy concern
policy-based governance
power engineering computing
Power system protection
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »