Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Memory
biblio
Protecting Data in Android External Data Storage
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
storage management
android encryption
secure Android data storage
proactive-control
Permission
malicious malware
external-storage
Android external storage vulnerability
Android external data storage
Metrics
Memory
Android (operating system)
Monitoring
smart phones
Vulnerability
Data protection
Computer hacking
pubcrawl
Human behavior
Resiliency
mobile computing
invasive software
encryption
Scalability
biblio
Increase Capacity of QR Code Using Compression Technique
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
error correction codes
storage management
smart cities
RGB color technique
Resiliency
QR–Code
QR codes
QR code decoder application
pubcrawl
Multi color QR code
Memory
Libraries
Image color analysis
bank data processing
encoding
e-wallet companies
demonetization step
Decoding
data storage capacity
data compression
cyber physical systems
Cryptography
compression technique
cashless society
barcode
Bar codes
biblio
A Third Party Audit Mechanism for Cloud Based Storage Using File Versioning and Change Tracking Mechanism
Submitted by grigby1 on Mon, 07/01/2019 - 10:03am
integrity data
version information
third party auditor
third party audit mechanism
storage management
Servers
security of data
Security Audits
security
Scalability
Resiliency
resilience
pubcrawl
Protocols
party auditor
Memory
audit process
Human Factors
Human behavior
hash information
file versioning
file owner
encryption
Data Security
data privacy
data integrity
cloud storage server
Cloud Computing
cloud based storage
change tracking mechanism
auditing
biblio
InvisiMem: Smart Memory Defenses for Memory Bus Side Channel
Submitted by grigby1 on Wed, 11/14/2018 - 1:15pm
Compositionality
die stacking
expandability
Memory
pubcrawl
resilience
Resiliency
security
biblio
FADETPM: Novel approach of file assured deletion based on trusted platform module
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
Scalability
Handheld computers
integrity
internet
Memory
offline data storage
outsourced data files
privacy
pubcrawl
File Assured Deletion
SSP
storage management
storage service provider
tpm
Trusted Computing
Trusted Platform Module
VANISH
Business
file access policies
FADETPM
FADE
Ephemerizer
data privacy
data integrity
data deletion
Cryptography
cryptographic issues
computer storage space
computer storage management
computer security
cloud storage
Cloud Computing
business risk
biblio
A Remote Data Integrity Checking Scheme for Big Data Storage
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
fine-grained update
Servers
Scalability
remote data integrity checking scheme
remote data integrity checking
pubcrawl
privacy
Memory
mapping relationship
Indexes
Balanced update tree
dynamic update
data structures
data privacy
Data models
data integrity
data deletion
data block
big data storage
Big Data
biblio
Performance Evaluation of a Fragmented Secret Share System
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
resilient mechanism
large-scale data leakage
Memory
metadata
Metrics
performance evaluation
pubcrawl
public storage environments
resilience
Resiliency
large scale data infrastructure
Robustness
secret shares
secure data storage
Secure File Sharing
storage locations
storage management
threshold sizes
thresholds scheme
data integrity
big data storage
Cloud Computing
composability
consistent data availability
Cryptography
data
Data fragmentation
data handling
Big Data
data retrievals
disaster contention
encryption
file recovery
fragmented secret share system
Human behavior
key
keyless mechanism
biblio
From Bitcoin to cybersecurity: A comparative study of blockchain application and security issues
Submitted by grigby1 on Thu, 02/15/2018 - 11:41am
bitcoin
bitcoin security
blockchain
computer security
Cybersecurity
Human behavior
human factor
Human Factors
Memory
privacy
privacy-protection
pubcrawl
Reliability
Scalability
tamper-proofing
biblio
Protecting Outsourced Data in Semi-Trustworthy Cloud: A Hierarchical System
Submitted by grigby1 on Fri, 02/02/2018 - 1:29pm
organisational aspects
usability goal
Trustworthy Systems
third-party services
storage service providers
SSP
semitrustworthy cloud
Semi-trustworthy storage
Security Goal
scalable data storage services
scalable data sharing services
Resiliency
pubcrawl
privacy data management system
outsourcing
outsourced data protection
Access Control
Memory
hierarchical system
hierarchical access control
HAC-DMS
encryption
decryption keys
Data protection
data outsourcing
data confidentiality
cyber physical systems
Cryptography
composability
Cloud Computing
authorisation
attribute based encryption
biblio
Auditing of Data Integrity over Dynamic Data in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
outsourced data
vector commitment
Servers
security of data
security feature
secure data auditing mechanism
Resiliency
remote data storage
remote cloud data
Public key
pubcrawl
outsourcing
Outsourced Database Integrity
backward unlinkable verifier local revocation group signature
Metrics
Memory
dynamic data
Databases
data integrity
data auditing
computational time complexity
composability
Collusion Attacks
Clustering algorithms
cloud server
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »