Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
location privacy
biblio
Game Theory Meets Network Security and Privacy
Submitted by awhitesell on Thu, 02/09/2017 - 12:12pm
Science of Security
NSA SoS Lablets Materials
Science of Security
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
UIUC
game theory
network security and privacy
intrusion detection system
location privacy
revocation
wireless security
Cryptography
multiparty computation
UIUC
NSA SoS Lablets Materials
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
biblio
Robust encryption algorithm based SHT in wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
network traffic
wireless sensor networks
wireless device network
testing
telecommunication traffic
supply location
sturdy cryptography algorithmic rule
SHT
robust encryption algorithm
privacy
nuisance parameters and committal to writing theory
nuisance data victimization sturdy cryptography algorithmic rule
anonymity
machine load problem
location privacy
interval indistinguishability
Hypothesis testing
encryption
device network obscurity
Cryptography
Correlation
consecutive hypothesis testing
Computer hacking
communication overhead
biblio
Examining the Effect of Wireless Sensor Network Synchronization on Base Station Anonymity
Submitted by BrandonB on Mon, 05/04/2015 - 1:11pm
synchronisation
WSN topology
wireless sensor networks
wireless sensor network synchronization
Wireless Sensor Network
Wireless communication
traffic analysis techniques
TPSN
timing-synch protocol for sensor networks
telecommunication traffic
telecommunication security
telecommunication network topology
Synchronization
anonymity
sensors
security mechanisms
reference broadcast synchronization
Receivers
RBS
Protocols
network traffic flow
location privacy
evidence theory analysis
data sources
BS anonymity improvement
base station anonymity
biblio
Preserving location privacy based on distributed cache pushing
Submitted by BrandonB on Mon, 05/04/2015 - 1:10pm
markov chain
Trajectory
Servers
privacy
mobility management (mobile radio)
mobile users
mobile computing
Mobile communication
Markov processes
cache storage
location privacy preservation scheme
location privacy
location based service
Distributed databases
distributed cache pushing
data privacy
computer architecture
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
A Metric for Evaluating Base Station Anonymity in Acknowledgement-Based Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:57pm
Media Access Protocol
WSN topology
wireless sensor networks
Wireless Sensor Network
traffic analysis technique
telecommunication traffic
telecommunication security
standards
sensors
network traffic flow
acknowledged communication
Measurement
location privacy
enhanced evidence theory metric
Correlation
base station anonymity
anonymity
acknowledgement based wireless sensor networks
acknowledgement aware evidence theory
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations
biblio
Achieving privacy preservation in WiFi fingerprint-based localization
Submitted by BrandonB on Mon, 05/04/2015 - 12:23pm
location privacy
wireless LAN
WiFi fingerprint-based localization
smart phones
signal strengths
Servers
real-world environments
PriWFL
privacy-preserving WiFi fingerprint localization scheme
privacy
performance enhancement algorithm
mobile computing
Accuracy
localization service provider
indoor mobility prediction
indoor localization
IEEE 802.11 Standards
Homomorphic encryption
Databases
data privacy
Cryptography
computer network security
computational overhead reduction
Android smartphone
« first
‹ previous
1
2
3
4
5
6
7