Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Privacy-preserving
biblio
Research on Governmental Data Sharing Based on Local Differential Privacy Approach
Submitted by grigby1 on Fri, 10/16/2020 - 11:24am
information sharing
statistical data
statistical analysis
sharing statistics
Resiliency
resilience
pubcrawl
private blockchain
Privacy-preserving
privacy protection models
privacy disclosure
privacy
policy-based governance
Peer-to-peer computing
local differential privacy
blockchain
information management
governmental departments
governmental data sharing
government information resources
government departments
government data processing
Government
e-government applications
E-Government
differential privacy
data sharing
data privacy
Cybersecurity
collaboration
biblio
Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
locality-sensitive hashing
Computing Theory and Privacy
single data owner model
searchable encryption schemes
search privacy
privacy-preserving fuzzy multikeyword search
plaintext search techniques
multiple data owners
LSH
Information Leakage
fuzzy multi-keyword search.
encrypted documents
ciphertext search
Bloom filter
BF
Cloud Computing
Privacy-preserving
encryption method
cloud server
Indexes
fuzzy set theory
query processing
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Cryptography
Servers
Scalability
biblio
An Enhanced Approach to Cloud-based Privacy-preserving Benchmarking
Submitted by aekwall on Mon, 09/28/2020 - 12:01pm
Homomorphic encryption
Computing Theory and Privacy
statistical measures
secure multi-party computation
product cost optimisation
privacy-preserving benchmarking systems
Oblivious transfer
key performance indicators
key figure comparison
cloud-based privacy-preserving benchmarking
cloud-based KPI comparison
cloud-based
benchmarking system
Benchmarking
software performance evaluation
Cloud Computing
Privacy-preserving
Benchmark testing
Complexity theory
statistical analysis
Companies
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
encryption
Cryptography
Scalability
biblio
Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices
Submitted by aekwall on Mon, 09/14/2020 - 12:28pm
Privacy-preserving
composability
smart IoT devices
smart Internet of Things (IoT) devices
privacy-preserving outsourced speech recognition
outsourced privacy-preserving speech recognition framework
neural network-based speech recognition
long short-term memory neural network
long short-term memory (LSTM)
intelligent IoT device voice control
human-machine interaction interface
forward propagation (FP)
Back propagation through time (BPTT)
additive secret sharing-based interactive protocols
data privacy
Speech recognition
edge computing
recurrent neural nets
Logic gates
Neural networks
Cryptography
privacy
pubcrawl
privacy leakage
Protocols
distributed processing
Internet of Things
biblio
An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
Protocols
wireless environment
verifiable secret sharing(VSS)
verifiable secret sharing
vehicular ad hoc networks
Vehicular ad hoc network(VANET)
VANET
Traffic Safety
telecommunication traffic
telecommunication security
Security analysis
Scalability
Resiliency
resilience
pubcrawl
anonymous conditional authentication scheme
privacy-preserving requirements
privacy-preserving authentication scheme
Privacy-preserving
privacy
mutual authentication phase
message generation
message authentication code(MAC)
message authentication code
message authentication
data privacy
Cryptography
communication overhead
authentication
anonymous messaging
biblio
Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
single cloud environment
cloud storage service
CP-ABE algorithm
multi-cloud
multicloud architecture
multicloud CP-ABE
privacy leakage
Privacy-preserving
privacy-preserving CP-ABE access control scheme
share data
cloud storage environment
single cloud scheme
single-cloud CP-ABE
suitable security access control technology
user attribute set
user collusion attack
user data
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
collaboration
pubcrawl
encryption
Access Control
authorisation
Cloud Computing
data privacy
Servers
Scalability
storage management
privacy
Cryptography
policy-based governance
CP-ABE
encryption scheme
access control overhead
access policy tree
achieving privacy-preserving CP-ABE access control
ciphertext-policy
cloud storage
biblio
NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
recommender system
user privacy in the cloud
user privacy data
user personal information security
recommendation system
recommendation process
privacy protection algorithm
NMF-based privacy-preserving collaborative filtering
nmf
matrix elements
information science
recommender systems
Matrix decomposition
Privacy-preserving
security of data
Scalability
data privacy
collaboration
Data protection
Hybrid algorithm
Metrics
privacy
collaborative filtering
pubcrawl
Resiliency
Servers
Cloud Computing
biblio
Measuring data privacy preserving and machine learning
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
Organizations
Software
sensitive data
pubcrawl
Privacy-preserving
privacy violations
privacy preservation metric
Privacy Preferences
privacy models and measurement
privacy measurement
privacy levels
privacy
Computational modeling
Metrics
Measurement
machine learning techniques
machine learning models
machine learning
learning (artificial intelligence)
data publishing
data publisher
data privacy-preserving
data privacy
data owners
biblio
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
Human Factors
Xyreum
time-based zero-knowledge proof of knowledge
time-based zero knowledge proof of knowledge
mutual multifactor authentication
Industrial Internet of Things
enhanced IIoT security
computational complexity
computation complexity
blockchain-based security protocol
blockchain solutions
blockchain group decision-making process
blockchain designs
multifactor authentication
authenticated encryption
Privacy-preserving
security
Scalability
Distributed databases
Cyber Attacks
Decision Making
blockchain
Metrics
Cryptography
privacy
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
biblio
Efficient Privacy-Preserving User Identity with Purpose-Based Encryption
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
identity management systems
Scalability
resilience
purpose-based encryption
pubcrawl
Protocols
privacy-preserving user identity
Privacy-preserving
Privacy Policies
privacy
PII
personal identifiable information
identity propagation
attribute-based encryption
Identity management
Human behavior
General Data Protection Regulation
federated identity management
Facebook
encryption
Data protection
Cryptography
cloud services
cloud environment
Cloud Computing
authorization
« first
‹ previous
1
2
3
4
5
next ›
last »