Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy protection
biblio
A Remote-Attestation-Based Extended Hash Algorithm for Privacy Protection
Submitted by grigby1 on Wed, 01/10/2018 - 12:27pm
Algorithm design and analysis
Compositionality
Economics
Extended hash algorithm
hash algorithms
Measurement
Merkle hash tree
Niobium
privacy
privacy protection
pubcrawl
Remote Attestation
Resiliency
security
Software algorithms
Trusted Computing
biblio
One-Round Provably Secure Yoking-Proof for RFID Applications
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy protection
yoking-proof
tools
RFIDs
RFID tags
RFID tagged objects
RFID tag pair
RFID applications
RFID
Resiliency
radiofrequency identification
pubcrawl
provable security
authentication
privacy model
privacy
one-round provably secure yoking-proof
one-round offline yoking-proof scheme
Moriyama security model
IoT
Internet of Things
Human Factors
Human behavior
data privacy
Cryptography
biblio
Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
Submitted by grigby1 on Mon, 11/27/2017 - 12:06pm
Homomorphic encryption
user privacy data protection
TTP
trusted third party
semantic security
secure multiparty computation
Resiliency
public key cryptography
public environments
pubcrawl
privacy protection
plain text attack
Metrics
homomorphic encryption scheme
Cloud Computing
GPS data of the earthquake
GPS data
encryption
encrypted outsourcing data
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
Data Security
data privacy
compute complexity
composability
Cloud Security
biblio
Ports Distribution Management for Privacy Protection Inside Local Domain Name System
Submitted by K_Hooper on Wed, 10/25/2017 - 11:57am
domain name system
ports distribution
privacy protection
pubcrawl
resilience
resource management
Scalability
Security by Default
biblio
A Passive Means Based Privacy Protection Method for the Perceptual Layer of IoTs
Submitted by grigby1 on Mon, 04/24/2017 - 11:39am
anonymity
anonymity in wireless networks
composability
horizontal hierarchy slicing
Human behavior
Internet of Things
link quality indicator
Metrics
privacy protection
pubcrawl
Resiliency
biblio
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol
Submitted by grigby1 on Mon, 04/24/2017 - 11:38am
anonymity
anonymity in wireless networks
anonymous messaging
composability
distance bounding
Human behavior
Metrics
privacy protection
provable security
proven security
Provenance
pubcrawl
Resiliency
biblio
Multi-stage face recognition for biometric access
Submitted by grigby1 on Wed, 03/08/2017 - 2:14pm
face recognition
user-identification data
standards
pubcrawl170113
privacy protection
principal component analysis
performance evaluation
PCA
multistage face recognition algorithms
Multi-stage face recognition
LDA
KNN
information system protection
image classification
feature extraction
AT&T database
face image
Face
extended Yale database
EPK
ELK
Eigenvalues and eigenfunctions
eigenfaces
Databases
data privacy
classifiers
biometrics (access control)
biometric facial features
biometric access
biblio
Distinguishable de-identified faces
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
Active appearance model
Brightness
Clustering algorithms
Data protection
distinguishable de-identified faces
face recognition
Facial features
k-anonymity approach
k-same de-identified video
privacy
privacy protection
pubcrawl170113
testing
biblio
Automatic hair color de-identification
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
image recognition
video record
Skin
Segmentation
real-looking deidentified image
pubcrawl170113
privacy protection
privacy
primary biometric trait
multimedia content
image segmentation
automatic hair color deidentification method
image hair area segmentation
image colour analysis
Image color analysis
Hair Color
Hair
Facial features
Face
de-identification
data privacy
basic hair color recognition
biblio
Face de-identification using facial identity preserving features
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
facial images
surveillance
social networking (online)
pubcrawl170113
privacy-preserving social media
privacy protection
privacy
machine learning
learning (artificial intelligence)
k-anonymity facial image de-identification
k-anonymity
intra-identity variances
intelligent surveillance applications
image recognition
Active appearance model
facial image identity recognition
facial identity preserving features
face representation
face recognition
face de-identification
face blurring techniques
Face
deep learning-based facial identity-preserving features
deep learning
Databases
data privacy
automated human facial image de-identification
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »