Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
anonymization
biblio
An Interaction Model for De-Identification of Human Data Held by External Custodians
Submitted by grigby1 on Thu, 01/31/2019 - 12:23pm
anonymization
cloud
de-identification
emotions
Metrics
privacy
pubcrawl
resilience
Resiliency
Scalability
user privacy
user privacy in the cloud
biblio
TMk-Anonymity: Perturbation-Based Data Anonymization Method for Improving Effectiveness of Secondary Use
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
perturbation
TMk-anonymity
Resiliency
resilience
pubcrawl
privacy preservation
privacy
Pk-anonymity
Perturbation methods
anonymity
Metrics
k-anonymity
Human Factors
Human behavior
Global Positioning System
gaussian distribution
composability
anonymization
biblio
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability Without Big Brother
Submitted by grigby1 on Fri, 09/28/2018 - 3:13pm
anonymous messaging
Anomaly Detection
anonymization
digital signatures
privacy-preserving protocols
pubcrawl
resilience
Scalability
biblio
Limits of location privacy under anonymization and obfuscation
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
markov chain
Time series analysis
statistical analysis
Scalability
Resiliency
resilience
pubcrawl
privacy
obfuscation
mobile devices
mobile computing
Measurement
Markov processes
anonymization
location-based services
Location Privacy Protecting Mechanism (LPPM)
location privacy
Location Based Service (LBS)
information theory
Information Theoretic Privacy
human factor
Human behavior
general Markov Chain model
data privacy
Computing Theory
anonymization-based LBS systems
biblio
Unraveling Blockchain Based Crypto-Currency System Supporting Oblivious Transactions: A Formalized Approach
Submitted by grigby1 on Thu, 05/24/2018 - 12:26pm
blockchain security
anonymization
blockchain
Measurement
Metrics
privacy
privacy models
pubcrawl
biblio
Implementing A Framework for Big Data Anonymity and Analytics Access Control
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
Data processing
tools
Sensitivity
Resiliency
resilience
pubcrawl
privacy protection
Metrics
MapReduce
k-anonymity
Human behavior
Hadoop ecosystems
framework standardization
data suppression
Access Control
data privacy
data management
data anonymization methods
data analysis
composability
Big Data anonymity framework
Big Data
authorization
authorisation
anonymization
anonymity
analytics access control
biblio
Anonymous port scanning: Performing network reconnaissance through Tor
Submitted by grigby1 on Thu, 04/20/2017 - 12:43pm
Network reconnaissance
Tor
scanning processes
scanning
scan rate
Resiliency
Reconnaissance
pubcrawl
Ports (Computers)
Nmap
Acceleration
Network interfaces
Management information systems
Linux
IP networks
internet
computer communications software
anonymous port scanning
anonymizing port scanning tools
anonymization
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
biblio
Information Security in Big Data: Privacy and Data Mining
Submitted by BrandonB on Tue, 05/05/2015 - 9:34am
decision maker
tracking
sensitive information
security of data
Provenance
privacypreserving data mining
privacy-preserving data mining
privacy preserving data mining
privacy auction
privacy
PPDM
information security
information protection
game theory
Algorithm design and analysis
data publishing
data provider
Data protection
data privacy
Data mining
data miner
data collector
data acquisition
computer security
Big Data
anti-tracking
anonymization
biblio
Privacy and Big Data
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
anonymization
Big Data
data analysis
Data collection
Data integration
data privacy
data retention
de-identification
Government
privacy
Public policy
security
« first
‹ previous
1
2
3
next ›
last »