Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy and security
biblio
Privacy security protection based on data life cycle
Submitted by grigby1 on Fri, 03/31/2023 - 11:18am
Production
safeguard
privacy and security
life cycle
Resiliency
big data security in the cloud
Data processing
Data Security
Big Data
Cloud Computing
data privacy
Scalability
Hardware
Software
resilience
Metrics
pubcrawl
biblio
Securing mHealth Applications with Grid-Based Honey Encryption
Submitted by grigby1 on Tue, 06/14/2022 - 3:15pm
Metrics
privacy and security
password-based authentication
mobile healthcare
mhealth
honey encryption
grid-based authentication
biometrics (access control)
biometric encryption
Force
pubcrawl
malware
Industries
Medical services
Biological system modeling
authentication
Scalability
Resiliency
resilience
biblio
Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
Internet of Things
Transportation
security protocols
Scalability
Resiliency
resilience
Public-Key Cryptosystems (PKC)
public-key cryptosystems
public key cryptography
pubcrawl
privacy and security
Metrics
Medical services
lightweight devices
IoT devices
Internet of Things (IoT)
computer architecture
indoor localization
healthcare facilities
health care
Hardware/Software Co-Design
hardware-software codesign
hardware-software co-design
Hardware
energy consumption
Elliptic-Curve Cryptography (ECC)
elliptic-curve cryptography
Elliptic curve cryptography
ECC
Cryptography
Cryptographic Protocols
biblio
Encrypted LQG Using Labeled Homomorphic Encryption
Submitted by grigby1 on Tue, 01/21/2020 - 11:54am
Compositionality
encrypted control
encryption audits
Metrics
privacy and security
pubcrawl
resilience
Resiliency
biblio
Privacy-Preserving Frequent Pattern Mining from Big Uncertain Data
Submitted by grigby1 on Wed, 03/06/2019 - 4:26pm
imprecise and uncertain data
uncertainty
transaction-centric mining approach
Program processors
privacy-preserving mining
privacy-preserving frequent pattern mining
privacy and security
knowledge management
knowledge discovery in databases
Itemsets
item-centric mining approach
item-centric mining
data privacy
fruition processes
frequent patterns
data science
big uncertain data
big data science solutions
big data privacy
Data Analytics
Clustering algorithms
Data mining
pubcrawl
Big Data
biblio
A lightweight RFID authentication protocol with confidentiality and anonymity
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy
telecommunication security
RFIDs
RFID tags
RFID system
RFID
Resiliency
replay attack
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
protocol
privacy and security
authentication
open wireless radio wave
on-chip CRC function
low-cost passive tags
location trace
lightweight RFID authentication protocol
Internet of Things
Human Factors
Human behavior
Hash functions
eavesdropping prevention
DOS-attack prevention
Cryptography
Cryptographic Protocols
CRC
biblio
Privacy Challenges in Mobile and Pervasive Networks
Submitted by grigby1 on Tue, 08/22/2017 - 11:53am
Human behavior
mobile networks
pervasive computing
pervasive networks
privacy and security
pubcrawl
Resiliency
Scalability