Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption techniques
biblio
Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
Base stations
Location Privacy in Wireless Networks
source location privacy
signal strength
routing schemes
routing information
packet delivery
Location Privacy breach
incoming packet
dummy traffic
dummy packets
delay
base station
Phantoms
privacy breaches
TTL
telecommunication traffic
Compositionality
sensors
encryption techniques
telecommunication network routing
Metrics
Cryptography
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
Comparative Analysis of Encryption and Decryption Techniques Using Mersenne Prime Numbers and Phony Modulus to Avoid Factorization Attack of RSA
Submitted by aekwall on Mon, 09/21/2020 - 2:47pm
Dual RSA
confinement
Wiener'
Trial Division
s Factorization
s attack
Rivest Shamir and Adleman algorithm
Public Key cryptographic algorithm
phony modulus
online Security
Mersenne prime numbers
Mersenne Prime
Fermat'
factorization attack
encryption
decryption techniques
public-key cryptography
RSA algorithm
Ciphers
public key cryptography
cyber-physical systems
encryption techniques
privacy
Mathematical model
composability
pubcrawl
Resiliency
biblio
Toward Instantaneous Sanitization through Disturbance-induced Errors and Recycling Programming over 3D Flash Memory
Submitted by grigby1 on Thu, 07/09/2020 - 12:56pm
Human behavior
three-dimensional integrated circuits
Scalability
sanitization functionalities
sanitization
Resiliency
resilience
recycling programming design
pubcrawl
programming disturbance properties
programming
privacy
NAND circuits
instantaneous data sanitization scheme
Human Factors
3D NAND flash memory chips
flash memory
flash memories
error correction codes
error correction code
encryption techniques
disturbance-induced errors
disturbance overheads
Data Security
data sanitization techniques
Data Sanitization
data deletion
Compositionality
3D NAND flash-memory-based devices
biblio
Detection and Prevention of Routing Attacks in Internet of Things
Submitted by grigby1 on Wed, 01/16/2019 - 1:25pm
MatLab simulation
Trusted Computing
smart objects
smart network
Sinkhole
Selective Forwarding
security
RPL
routing attack prevention
routing attack detection
Routing attack
Routing
Resiliency
pubcrawl
Protocols
message authentication
6LoWPAN
Key Match Algorithm
IoT based network
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
Internet of Things
internet
encryption techniques
Cryptography
composability
Clustering algorithms
Cluster-Based Algorithm
CBA algorithm
authentication techniques
biblio
Ideal complexity cryptosystem with high privacy data service for cloud databases
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Databases
storage services
secrecy
Scalability
Safety
Resiliency
resilience
pubcrawl
privacy
metadata
human factor
Human behavior
high privacy data service
encryption techniques
encryption
client data
database management systems
Database as a service
data storage
data privacy
data confidentiality
cryptosystem
Cryptography
Concurrency
Computing Theory
Complexity theory
Cloudcomputing
cloud service provider
cloud databases
Cloud Computing
biblio
"An integrated signaling-encryption mechanism to reduce error propagation in wireless communications: performance analyses"
Submitted by grigby1 on Mon, 02/13/2017 - 1:19pm
signaling encryption mechanism
Monte Carlo simulations
pubcrawl170102
quality of service
quality of service (QoS)
radio networks
Rayleigh channels
Rayleigh fading
Rayleigh fading-type channels
reduce error propagation
integrated signaling encryption mechanism
telecommunication security
Throughput
time delay processing
transmission data rate
wireless channel interference
wireless channels
Wireless communication
Wireless communications
encryption
advanced encryption standard (AES)
AES
Bit error rate
bit-error probability
bit-error rate
bit-error rate performance
convolutional error correction coding
Cryptography
encoding
advanced encryption standard
encryption techniques
error correction codes
error correction coding
error statistics
fading channels
Gaussian fading-type channels
Hamming coding
incorporate error correction
biblio
Effective personalized mobile search using KNN
Submitted by BrandonB on Mon, 05/04/2015 - 12:20pm
KNN
Vectors
user preferences
user preference privacy
Servers
search engines
personalized mobile search
personalization
pattern classification
Ontology
Ontologies
mobile search engine
mobile computing
Mobile communication
location search
Android based mobile
k nearest neighborhood
information retrieval
encryption techniques
data privacy
data maintaining security
Cryptography
concept extraction
concept
client-server systems
client-server architecture
clickthrough data
Classification algorithms
classification
Androids