Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy issues
biblio
Trustworthy Management in Decentralized IoT Application using Blockchain
Submitted by aekwall on Mon, 04/13/2020 - 9:21am
IoT system
Trustworthy Systems
trustworthy management
Trust management
trust issue
supply chain system
Smart City
smart car
security
Resiliency
pubcrawl
privacy issues
privacy
IoT technology
associated users
IoT
Internet of Things
human living standard
ethereum
decentralized IoT application
data privacy
data modification
cyber physical systems
current centralized system
composability
blockchain technology
Blockchain implementation
blockchain
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Privacy and Security of Connected Vehicles in Intelligent Transportation System
Submitted by grigby1 on Mon, 02/17/2020 - 4:04pm
Intelligent Transportation System
sensory data
security scalability
Scalability
Roads
road vehicles
road traffic control
road side unit
pubcrawl
privacy issues
privacy
permutation
mobile computing
Compositionality
intelligent transportation
group members
group leader
encryption
data streams
Data Security
data privacy
data confidentiality
Cryptography
connected vehicles
computer security
biblio
Cybersecurity concerns on real time monitoring in electrical transmission and distribution systems (SMART GRIDS)
Submitted by aekwall on Mon, 02/17/2020 - 1:17pm
Smart Grids
virtual world
uniform legal system
transmission and distribution systems
national borders
Information Technology Introduction
energy delivery system
electrical transmission
distribution systems
cybersecurity concerns
Communications
common perception
privacy issues
information technology
power system security
security
power engineering computing
smart grid security
smart power grids
standards
Metrics
privacy
pubcrawl
Resiliency
Software
data privacy
Scalability
Computer crime
security of data
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
Uncertainty-Aware Authentication Model for Fog Computing in IoT
Submitted by aekwall on Mon, 12/30/2019 - 11:16am
Naive Bayes
uncertainty-aware authentication model
uncertainty handling
uncertainty
Support vector machines
support vector machine
supervised learning
supervised classification algorithms
security issues
Scalability
Resiliency
regression analysis
pubcrawl
privacy issues
prediction model
pattern classification
Fog computing
Mobile Edge Computing
logistic regression
IoT
Internet of Things
Fog Computing and Security
Decision trees
Decision Tree
Cloud Computing
Cisco Systems
Bayes methods
authorisation
authentication
attribute based access control model
ABAC model
security
biblio
A Control-Theoretic Approach for Location Privacy in Mobile Applications
Submitted by grigby1 on Mon, 12/16/2019 - 2:53pm
location privacy
users mobility pattern
Scalability
Resiliency
resilience
pubcrawl
protection algorithm
privacy issues
privacy
POI-related privacy measure
PI control strategy
PI control
mobility records simulation
mobile computing
Mobile Applications
Meters
Computing Theory and Privacy
location information
literature focus
Human behavior
dynamic modeling
dispersion
data privacy
Data models
cyber physical systems
Cyber Physical System
control-theoretic approach
control-based approach
Control Theory
control signals
control formulation
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 1:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
Security and privacy for IoT and fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 3:47pm
heterogeneous ecosystem
Trust management
smart objects
security challenges
Scalability
risk-based trust management model
Resiliency
pubcrawl
Protocols
privacy issues
privacy
IoT
Internet of Things
human privacy
authentication
fog computing paradigm
Fog Computing and Security
Fog computing
edge computing
distributed processing
Data Security
data privacy
computing clouds
computer network security
Computational modeling
Cloud Computing
cameras etc
biblio
De Duplication Scalable Secure File Sharing on Untrusted Storage in Big Data
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
knowledge copy
knowledge deduplication
Metrics
Peer-to-peer computing
privacy issues
pubcrawl
Public key
resilience
knowledge confidentiality
Secure File Sharing
security
security issues
sensitive data
storage
Token
untrusted storage
Writing
data privacy
Big Data
ciphertexts
Cloud Computing
composability
confluent key
convergent secret writing
cryptographical hash price
Cryptography
ancient secret writing
decryption
deduplication scalable secure file sharing
embedded systems
encoding
encryption
hashkey
Human behavior
information copy
« first
‹ previous
1
2
3
next ›
last »