Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy protection
biblio
PMDA: Privacy-Preserving Multi-Functional Data Aggregation Without TTP in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 3:16pm
privacy leakage
TTP
trusted third party
smart power grids
smart meters
Smart Grids
Smart Grid Privacy
Smart Grid
Security analysis
security
pubcrawl
privacy-preserving multifunctional data aggregation
privacy-preserving aggregation
privacy protection
privacy preserving
composability
privacy flaws
privacy
power engineering computing
PMDA
multifunctional aggregation
Multi-functional computation
Metrics
Meters
Human behavior
energy management
electricity readings
data privacy
data aggregation
Cryptography
biblio
Multi-Bit Leveled Homomorphic Encryption of Message Matrices
Submitted by grigby1 on Fri, 02/08/2019 - 4:20pm
Asymmetric Encryption
Cloud Computing
composability
Compositionality
fully homomorphic encryption
Homomorphic encryption
Human behavior
Human Factors
Metrics
Multi-bit encryption
privacy protection
pubcrawl
resilience
Resiliency
Scalability
biblio
Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems
Submitted by grigby1 on Thu, 01/31/2019 - 12:22pm
cloud
Cloud Computing
Metrics
privacy protection
pubcrawl
resilience
Resiliency
Scalability
truth discovery
user privacy
user privacy in the cloud
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
privacy protection
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
Human behavior
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biometric-based authentication
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
Acoustic Fingerprints
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
biblio
Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation
Submitted by grigby1 on Wed, 11/14/2018 - 1:19pm
privacy protection
Servers
secure risk analysis method
secure multiparty computation
secret sharing
Scalability
risk analysis
Random access memory
pubcrawl
Prototypes
Protocols
Attack Tree Analysis
privacy preserved rule-based risk analysis
privacy
Ports (Computers)
Human Factors
expert systems
Engines
data privacy
Cryptography
confidential information leakage
confidential information abuse
biblio
Mechanisms for Meaningful Consent in Internet of Things
Submitted by grigby1 on Wed, 11/14/2018 - 1:18pm
Internet of Things
transparency
Scalability
pubcrawl
privacy protection
privacy
meaningful consent
IoT system
Internet of Things (IoT)
apparency
Human Factors
expert systems
data privacy
data management
data activities
data actions
computer network security
biblio
A noise parameter configuration technique to mitigate detour inference attack on differential privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
inference attack
Scalability
Resiliency
pubcrawl
Probability distribution
privacy protection
privacy preserving technique
privacy
noise parameter configuration method
Mathematical model
linear regression
attribute correlation
Human behavior
differential privacy method
differential privacy
detour inference attack mitigation
Databases
data utility
Data protection
data privacy
Correlation
composability
biblio
Differential Privacy Data Protection Method Based on Clustering
Submitted by grigby1 on Fri, 09/28/2018 - 11:58am
information loss
Scalability
risk reduction
Resiliency
pubcrawl
privacy protection
pattern clustering
numerical attribute
mixed data
Knowledge Discovery
insensitive clustering method
insensitive clustering algorithm
categorical attribute
information disclosure
ICMD-DP method
Human behavior
distributed computing
differential privacy data protection method
differential privacy
data privacy
data availability
composability
clustering
biblio
Group signature based privacy protection algorithm for mobile ad hoc network
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
vehicular ad hoc networks
vehicular ad hoc network
Time delay
signature length
short group signature
Resiliency
resilience
pubcrawl
privacy protection issues
privacy protection
privacy
Packet loss rate
network model
anonymous verification
mobile ad hoc network
Metrics
message verification
MANET
group signature based privacy protection algorithm
digital signatures
Data protection
Compositionality
BBS algorithm
Batch verification
automobiles
authentication
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »