Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user privacy
biblio
Privacy-enhancing Federated Middleware for the Internet of Things
Submitted by grigby1 on Wed, 05/17/2017 - 12:27pm
actuator security
cloud
collaboration
composability
Human behavior
Internet of Things
Metrics
middleware
pubcrawl
Resiliency
Router Systems Security
security
security and privacy
Sensors and Actuators
user privacy
biblio
"Hiding User Privacy in Location Base Services through Mobile Collaboration"
Submitted by grigby1 on Thu, 02/23/2017 - 10:40am
mobile networks
Web surfing
web services
user privacy
telecommunication security
Smartphones
smart phones
Servers
pubcrawl170105
privacy
Peer-to-peer computing
mobility management (mobile radio)
collaboration
mobile crowd method
Mobile communication
mobile collaboration
location-based services
location privacy
location base services
location aware system
LBS server
GPS
Global Positioning System
biblio
A decentralized approach for security and privacy challenges in the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 10:06am
Information Leakage
wireless technologies
user privacy
sensitive data management
security challenges
security
public key cryptography
privacy
personal area networks
lightweight token
IoT stakeholders
IoT deployment
Internet of Things
internet
6LoWPAN
elliptic curve digital signature algorithm
ECDSA
distributed capability-based access control mechanism
distributed access control
digital signatures
data privacy
Cryptography
cryptographic primitives
computer network security
CoAP resources
authorization
authorisation
authentication
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
Analysis on Password Protection in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 12:26pm
leakage
vulnerability analyzing method
Vulnerability
user privacy
taint analysis
smart phones
PW Exam
privacy
password protection
password leakage
password
mobile computing
Android applications
Humanoid robots
encryption
decompile step
data privacy
cryptography misuse detection
cryptography misuse analysis
Cryptography
API call record
Androids
Android apps
biblio
A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?
Submitted by BrandonB on Mon, 05/04/2015 - 12:14pm
mobile computing
user privacy
unauthorized interceptions
text communication encryption
telecommunication security
smart phones
Skype
Protocols
mVoIP communications
mobile voice-over-Internet protocol
Android mobile devices
Mobile communication
lawful interceptions
Internet telephony
internet
Google
Entropy
data privacy
Cryptography
Android mobile VoIP applications
« first
‹ previous
1
2
3
4
5
6