Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Token
biblio
velink - A Blockchain-based Shared Mobility Platform for Private and Commercial Vehicles utilizing ERC-721 Tokens
Submitted by grigby1 on Thu, 08/04/2022 - 5:05pm
smart cities
trusted platform modules
Token
smart transportation
shared mobility
HSM
ERC-721
Space vehicles
smart contract
blockchain
Market research
ethereum
smart contracts
composability
privacy
Resiliency
resilience
pubcrawl
biblio
Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR)
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
software-defined networking
Protocols
pubcrawl
Relays
resilience
Resiliency
Routing
Servers
software defined networking
privacy
software-defined networking and onion routing
SOR architecture
telecommunication network routing
telecommunication traffic
Token
Tor
traffic surveillance
anonymity
OpenFlow
onion routing
network traffic censorship
multiple anonymity service providers
Metrics
internet
Human behavior
Government
E-cash
cyber anonymity technique
cyber anonymity service
computer network security
composability
cloud networks
Cloud Computing
biblio
De Duplication Scalable Secure File Sharing on Untrusted Storage in Big Data
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
Resiliency
knowledge copy
knowledge deduplication
Metrics
Peer-to-peer computing
privacy issues
pubcrawl
Public key
resilience
knowledge confidentiality
Secure File Sharing
security
security issues
sensitive data
storage
Token
untrusted storage
Writing
data privacy
Big Data
ciphertexts
Cloud Computing
composability
confluent key
convergent secret writing
cryptographical hash price
Cryptography
ancient secret writing
decryption
deduplication scalable secure file sharing
embedded systems
encoding
encryption
hashkey
Human behavior
information copy
biblio
Surveing the challenges and requirements for identity in the cloud
Submitted by BrandonB on Wed, 05/06/2015 - 1:28pm
user identity federation
Access Control
authentication
business organizations
Claim
cloud
Cloud Computing
cloud service providers
cloud technologies
Computational modeling
security of data
Token
security
Computers
computing resource sharing
data centers
Federated identity
federated identity management
Federation provider
hybrid clouds
Identity provider
Organizations
SaaS
biblio
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:54am
modified credit strategy
tokens renewal
Token
telecommunication security
security
Routing protocols
Routing
Q-factor
Protocols
network layer security protocol
network layer attacks
Ad hoc networks
mobile computing
Mobile ad hoc networks (MANETs)
mobile ad hoc networks
Energy Efficiency
E2-SCAN protocol
CSCAN
credit-based strategy
conditional SCAN
AODV
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob