Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
private information
biblio
A Monitoring Framework for Side-Channel Information Leaks
Submitted by grigby1 on Mon, 03/15/2021 - 12:10pm
monitor ambient light
side-channel sources
side-channel research
side-channel information leaks
side-channel detection
sensitive information
Resiliency
resilience
recent computer security research
pubcrawl
program security requirements
private information
privacy
popular memory safety
penetration testing tools
monitoring framework
classical exploitation techniques
Metrics
memory corruption
learning (artificial intelligence)
known design patterns
injection tools
indirect means
exploitation framework
data privacy
Cryptography
computer systems
computer network security
Computer Engineering
composability
command injection attacks
biblio
A Dynamic Mechanism for Security Management in Multi-Agent Networked Systems
Submitted by grigby1 on Tue, 02/16/2021 - 11:44am
Metrics
Strategic Agents
social surplus maximizing mechanism
social surplus maximization
Silicon
security management
Resiliency
resilience
pubcrawl
Probability distribution
private information
network theory (graphs)
network security
network coordinator
multi-agent systems
Social Agents
interdependent valuations
interconnected multiagent networked systems
inter-temporal correlations
incentive compatibility
dynamic networks
dynamic mechanism design problem
dynamic mechanism design
Cost accounting
computer security
computer networks
computer network security
composability
Communication networks
agents security state
biblio
Protecting Multimedia Privacy from Both Humans and AI
Submitted by grigby1 on Fri, 08/07/2020 - 2:47pm
image
AI
protecting multimedia privacy
private information
multimedia privacy issues
multimedia data
multimedia
image privacy
human adversaries
AI-assisted malicious entities
AI-assisted attackers
adversarial image perturbation
Image coding
privacy
Scalability
face recognition
privacy protection
deep learning
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
Artificial Intelligence
security of data
biblio
Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application
Submitted by aekwall on Mon, 02/10/2020 - 10:44am
piccolo encryption algorithm
4 input LUTs
64 bits block size
area optimization
ASIC
constrained RFID application
different design strategies
efficient hardware architecture
Fiestel structure
hardware design
hardware metrics
low resource applications
optimized area
Piccolo Algorithm
128 bits
piccolo lightweight algorithm
radiofrequency identification
relevant lightweight block ciphers
severe security concerns
supports high speed
Throughput.
tremendous pace
ultra-lightweight applications
variable key size
word length 64.0 bit
word length 80.0 bit
Xillinx
Microelectronics Security
security applications
field programmable gate arrays
FPGA
Cryptography
encryption
Internet of Things
telecommunication security
Hardware
Table lookup
IoT applications
smart devices
Resiliency
pubcrawl
composability
IoT
RFID
Throughput
Ciphers
security issues
Predictive Metrics
private information
word length 128.0 bit
Hardware Implementation
hardware resources
lightweight cryptographic algorithms
S-box
lightweight cryptography
biblio
GUILeak: Tracing Privacy Policy Claims on User Input Data for Android Applications
Submitted by aekwall on Mon, 11/11/2019 - 10:48am
Android mobile platform
User input
user data collection
private information
privacy-relevant app categories
privacy policy claims
privacy policy alignment
privacy leaks detection
Mobile privacy policy
Humanoid robots
graphical user interfaces
app producers
app code
Androids
Scalability
Android ecosystem
Android apps
Android applications
Android application
privacy protection
Privacy Policies
Layout
privacy
pubcrawl
Human behavior
mobile computing
Ontologies
data privacy
biblio
At Your Own Risk: Shaping Privacy Heuristics for Online Self-Disclosure
Submitted by grigby1 on Mon, 07/01/2019 - 9:06am
privacy awareness
user-centred privacy preferences
Task Analysis
social networking (online)
social network sites
sensitive information
Security Heuristics
Scalability
risk analysis
Resiliency
resilience
recurrent regrettable scenarios
pubcrawl
private information
privacy heuristics
acceptance trees
privacy
potential privacy risks
online self-disclosure
Human-computer interaction
Heuristics
Facebook
Employment
Decision trees
data structures
data structure representative
data privacy
aware- ness
audience component
adaptive privacy
biblio
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
road safety
private information
Protocols
pseudonym-varying scheduling
pubcrawl
real-time systems
Receivers
resilience
Resiliency
privacy properties
Scalability
secure authentication algorithm
Security Properties
spatial-temporal messages
Spatial-Temporal Trust mechanism
Symmetric-Key Cryptography
Trusted Computing
anonymous messaging
privacy
message authentication
malicious cars
Intelligent Transportation Systems
Intelligent Transportation System
FastTrust
Fast and Anonymous Spatial-Temporal Trust
Expressways
entropy-based commitment
data privacy
Cryptography
connected cars
automobiles
authorisation
authentication
biblio
Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Submitted by grigby1 on Mon, 01/21/2019 - 11:31am
tree structure
private information
pubcrawl
Resiliency
security
Security analysis
security threat
smart cities
telecommunication security
privacy
trees (mathematics)
VANET
vehicle network
vehicles
vehicular ad hoc network
vehicular ad hoc networks
vehicular ad-hoc networks
Ad Hoc Network Security
open access environment
Metrics
Logic gates
integrity
information discreet
important security requirements
data privacy
confidentiality
confidential information
Conferences
Computers
Compositionality
Availability
attack-defense tree
attack tree
biblio
A Hierarchical Game Framework for Data Privacy Preservation in Context-Aware IoT Applications
Submitted by grigby1 on Wed, 09/05/2018 - 9:38am
Numerical models
user-defender-attacker game
two-player model
two-player game model
two-layer three-player game framework
service provider
secure privacy-preserving protocols
Scalability
Resiliency
resilience
pubcrawl
private information
privacy
computer science
Internet of Things
human factor
Human behavior
hierarchical game framework
Games
game theory
data privacy preservation
data privacy
Data models
context-aware IoT applications
context-aware Internet
Computing Theory
biblio
A Model-Checking Approach for Enforcing Purpose-Based Privacy Policies
Submitted by grigby1 on Thu, 05/24/2018 - 11:28am
model-checking approach
web services
user behavior monitoring
realistic policies
purpose-based privacy policies
pubcrawl
private information
privacy models
privacy management tool
privacy management system
privacy
Natural languages
complex privacy policies
model checking
Metrics
Measurement
information disclosures
formal verification
formal modeling
Electronic mail
data sharing actions
data privacy
Data models
customized privacy policies
1
2
next ›
last »