Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptography
biblio
An intelligent agent based privacy preserving model for Web Service security
Submitted by BrandonB on Mon, 05/04/2015 - 1:56pm
quality of service
XML
WSDL
web services
Web service security
UDDI
Transport Layer Security
TLS
SSL
SOAP
Simple object access protocol
security of data
secured socket layer
secure channel
quality of services
Cryptography
QoS requirements
Protocols
privacy preserving
OSI layers
multi-agent systems
IP Sec
Internet Protocol Security
internet
intelligent agent based privacy preserving model
intelligent agent
HTTPI protocol
electronic data interchange
data privacy
data exchange
biblio
An efficient data security system for group data sharing in cloud system environment
Submitted by BrandonB on Mon, 05/04/2015 - 1:55pm
Document Sharing
software reliability
software maintenance
Servers
sensitive information storage
proficient document sharing
privacy concern
Internet connection reliability
group user membership change
group user identity confidentiality
group revocation advanced encryption standard scheme
group data sharing
Group Authorization
encryption
efficient data security system
Dynamic Group
Access Control
document security
document handling
document conservation
data security advanced encryption standard algorithm
data privacy
data encryption
Cryptography
confidentiality
cloud system environment
cloud data centres
Cloud Computing
authorization
authorisation
authentication
biblio
Inferring Malware Family through Application Protocol Sequences Signature
Submitted by BrandonB on Mon, 05/04/2015 - 1:42pm
application protocol sequences signature
computer network security
Cryptography
cyber-threats
Databases
Engines
Feeds
invasive software
learning (artificial intelligence)
machine learning algorithm
malicious packets detection
malware
malware automatic dynamic analysis
malware traffic detection
network traffic
Protocols
biblio
An anonymous payment system to protect the privacy of electric vehicles
Submitted by BrandonB on Mon, 05/04/2015 - 1:15pm
Energy Provider Company
vehicles
Trusted Platform Module
Trusted Computing
tpm
Servers
secondary cells
Registers
recharging service
recharging infrastructure
Protocols
privacy protection
privacy
financial management
EPC
anonymous credential technique
electrical energy
Electric Vehicles
driver privacy
driver information systems
double spending detection
data privacy
Cryptography
battery powered vehicles
battery
batteries
automobile
authentication
anonymous payment system
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
biblio
Robust encryption algorithm based SHT in wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
network traffic
wireless sensor networks
wireless device network
testing
telecommunication traffic
supply location
sturdy cryptography algorithmic rule
SHT
robust encryption algorithm
privacy
nuisance parameters and committal to writing theory
nuisance data victimization sturdy cryptography algorithmic rule
anonymity
machine load problem
location privacy
interval indistinguishability
Hypothesis testing
encryption
device network obscurity
Cryptography
Correlation
consecutive hypothesis testing
Computer hacking
communication overhead
biblio
Privacy-preserving channel access using blindfolded packet transmissions
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
Mica2 hardware
wireless sensor networks
wireless MAC-layer approach
wireless channels
Tinyos-2x test-bed implementation
time division multiple access
TDMA
RSSI
protocol
privacy-preserving channel access anonymity
privacy
periodic TDMA-Iike time-slot
Noise
add-on hardware module
MAC protocols
Interference
Heating
Google
Equations
data privacy
Cryptography
convergence
channel sensing strategy
blindfolded packet transmission
anonymity
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
Improved privacy-preserving authentication scheme for roaming service in mobile networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:07pm
Password authentication
user authentication
user anonymity
telecommunication security
symmetric-key techniques
smart cards
Smart card
security-related issues
security mechanism
roaming service
Roaming
Protocols
authentication
offline password guessing attacks
nontamper-resistant assumption
mobile users
mobile radio
mobile networks
mobile computing
Mobile communication
message authentication
improved privacy-preserving two-factor authentication scheme
Cryptography
« first
‹ previous
…
157
158
159
160
161
162
163
164
165
…
next ›
last »