Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy problems
biblio
An Identity Privacy Protection Strategy in Vehicle Named Data Network
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
malicious nodes
vehicular ad hoc networks
vehicle opportunity network
vehicle named data network
Security analysis
Scalability
ring signature scheme
Resiliency
resilience
pubcrawl
privacy protection
privacy problems
ONE-based VNDN platform
Named Data Network Security
anonymity
internet
interest packages
Identity Security
identity privacy protection strategy
identity information
Human behavior
digital signatures
data requester
data provider
data privacy
data packets
data names
computer network security
biblio
A Study on Data Security and Query privacy in Cloud
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
multifactor authentication
wide set
security policies
security of data
scalable resources
Scalability
Safety
pubcrawl
privacy problems
Privacy Policies
privacy contemplations
privacy
power system security
Oblivious RAM
noteworthy economic assistances
multioccupancy
authentication
Human behavior
high-tech tasks
encryption
effective resolutions
Economics
decreased operational expenditures
data privacy
data defence failures
confidentiality
Cloud Security
cloud platforms
cloud computing situations
Cloud Computing
Big Data
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
Investigating Attacks to Improve Security and Privacy in RFID Systems Using the Security Bit Method
Submitted by grigby1 on Wed, 10/02/2019 - 3:02pm
radiofrequency identification
wireless device
telecommunication security
security bit method
security
RFIDs
RFID technology
RFID tags
RFID tag
RFID systems
RFID security development
RFID reader
RFID
Resiliency
resilience
counterfeit
Radio frequency identification (RFID)
radio frequency identification
Radar
pubcrawl
privacy problems
privacy
Object recognition
Human Factors
Human behavior
Electronic Product Code (EPC)
Digital Information
Databases
data privacy
biblio
A Data Reconstruction Method for The Big-Data Analysis
Submitted by grigby1 on Wed, 03/06/2019 - 4:27pm
Correlation-coefficient
SOM (Self-Organizing-Map)
SOM
self-organising feature maps
self organizing map
Reconstruction algorithms
privacy-preserving methods
privacy problems
privacy data
Histograms
Histogram
extreme value record elimination
privacy
correlation coefficient
big-data reconstruction method
big-data
Big Data approach
Big Data analysis tools
big data privacy
data analysis
ART
pubcrawl
Big Data
data privacy
biblio
Privacy protection in cloud using identity based group signature
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
Elliptic curve cryptography
user authentication
security problems
secure anonymous authentication method
privacy protection
privacy problems
privacy
identity based group signature
identity based cryptosystem
group signature
authentication
digital signatures
data privacy
Cryptography
cloud services
Cloud Security
Cloud Computing
cloud
authorisation