Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Collusion Attacks
biblio
An Anti-Collusion Fingerprinting based on CFF Code and RS Code
Submitted by aekwall on Tue, 10/12/2021 - 3:21pm
Fingerprint recognition
Reed-Solomon codes
Reed-Solomon code
leak traceability
digital fingerprinting
Data Security
concatenated coding
Collusion Attacks
CFF
Provenance
Organizations
encoding
composability
Human behavior
Resiliency
Metrics
pubcrawl
Distributed databases
Resists
biblio
A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)
Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
Privacy.
Trusted Computing
trust model
trust computation
trust
telecommunication security
similarity model
similarity
sensors
security
Resiliency
resilience
Reliability
Recommendations
pubcrawl
Cloud Computing
mitigate badmouthing attacks
Metrics
malicious object
IoT security
IoT networks
IoT
Internet of Things
Human Factors
Human behavior
Data models
Computational modeling
composability
Collusion Attacks
biblio
Privacy-Preserving and Multi-Dimensional Range Query in Two-Tiered Wireless Sensor Networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:39pm
multidimensional range query protocol
wireless sensor networks
two-tiered wireless sensor networks
Silicon
sensor electronic devices
Resiliency
resilience
query processing
pubcrawl
Protocols
probability attacks
privacy-preserving range query
PERQ
network accountability
Biomedical monitoring
Monitoring
modular arithmetic range query mechanism
Metrics
Heart rate
generalized distance-based range query mechanism
differential attacks
data privacy
data integrity
cyclic modular verification scheme
Cryptographic Protocols
composability
Collusion Attacks
biblio
Auditing of Data Integrity over Dynamic Data in Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:22pm
outsourced data
vector commitment
Servers
security of data
security feature
secure data auditing mechanism
Resiliency
remote data storage
remote cloud data
Public key
pubcrawl
outsourcing
Outsourced Database Integrity
backward unlinkable verifier local revocation group signature
Metrics
Memory
dynamic data
Databases
data integrity
data auditing
computational time complexity
composability
Collusion Attacks
Clustering algorithms
cloud server
Cloud Computing
biblio
Secure Public Key Regime (SPKR) in vehicular networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
lower authentication delay
vehicular networks
vehicles
secure public key regime
Schnorr signature
road side units
public key cryptography
Public key
pubcrawl170109
preauthentication mechanism
mobile radio
authentication
digital signatures
Denial of Service attacks
denial of service attack
delegated trusted authorities
Computer crime
complex certificate verification process
Collusion Attacks
collusion attack
certificate-less PKI
certificate revocation list