Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
polynomial-time computable function
wireless security
wireless devices
Wireless communication
wireless channels
wireless channel characteristics
transport protocols
security
Protocols
Probes
private communications
privacy preserving password verification
1-out-of-2 oblivious transfer protocol
physical channel characteristics
Oblivious transfer
data privacy
Cryptography
cryptographic tools
Cryptographic Protocols
cryptographic protocol
computational complexity
computational assumptions
Communication system security
Channel estimation
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 2:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
A support middleware solution for e-healthcare system security
Submitted by BrandonB on Wed, 05/06/2015 - 2:10pm
Logic gates
wireless sensor networks
system security
support middleware solution
security vulnerabilities
security of data
patient information security
patient information privacy
network security
middleware
Medical services
medical administrative data processing
masquerade attack
authentication
Internet security
information sharing
health care-specific security standards
health care organizations
health care
electronic health care
e-Healthcare
e-health care system security
Data Security
data privacy
data integrity
Communication system security
biblio
#x201C;Role of metadata in forensic analysis of database attacks #x201C;
Submitted by BrandonB on Wed, 05/06/2015 - 1:55pm
fraudulent transaction
trail obfuscation
table storage
SQL injection
security issue
reconnaissance attack
privacy issue
open source database forensics tool
online activities
metadata
meta data
linked hash technique
Law
information retrieval
Information analysis
Handheld computers
anti-forensics attacks
forensic analysis
e-transactions
digital notarization
Digital Forensics
digital evidence
database server artifacts
database security breaches
database forensics
database attacks
data privacy
court of law
Conferences
cache
audit logs
antiforensics attacks
biblio
Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative
Submitted by BrandonB on Wed, 05/06/2015 - 1:28pm
identity management mechanisms
authentication
authorisation
authorization
communication protocols
Companies
data privacy
identifier
Identities of Things discussion group
identity
sensors
internet
Internet of Things
IoT
Kantara Initiative
name service
Object recognition
privacy
Protocols
biblio
Privacy Issues in Identity Verification
Submitted by BrandonB on Wed, 05/06/2015 - 1:25pm
identity proofing
wide-scale identity systems
verification
trust creation
privacy issues
privacy
national identity systems
knowledge-based authentication
knowledge management
KBA
imposter fraud
identity verification
identity scoring
biometrics
Identity management
identity fraud
identity document security
identity document fraud
identity credential
Identification
economic system
data privacy
computer security
commercial applications
business data processing
biometrics (access control)
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers
biblio
Global convergence in digital identity and attribute management: Emerging needs for standardization
Submitted by BrandonB on Wed, 05/06/2015 - 1:17pm
attribute format
attribute management
authentication
authorisation
authorization
Context
data privacy
digital identification
digital identity management
Educational institutions
global convergence
Identity management
privacy
privacy maintaining international framework
standards
biblio
Privacy protection in cloud using identity based group signature
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
Elliptic curve cryptography
user authentication
security problems
secure anonymous authentication method
privacy protection
privacy problems
privacy
identity based group signature
identity based cryptosystem
group signature
authentication
digital signatures
data privacy
Cryptography
cloud services
Cloud Security
Cloud Computing
cloud
authorisation
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Wed, 05/06/2015 - 11:07am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
« first
‹ previous
…
97
98
99
100
101
102
103
104
105
…
next ›
last »