Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
A decentralized approach for security and privacy challenges in the Internet of Things
Submitted by BrandonB on Wed, 05/06/2015 - 11:06am
Information Leakage
wireless technologies
user privacy
sensitive data management
security challenges
security
public key cryptography
privacy
personal area networks
lightweight token
IoT stakeholders
IoT deployment
Internet of Things
internet
6LoWPAN
elliptic curve digital signature algorithm
ECDSA
distributed capability-based access control mechanism
distributed access control
digital signatures
data privacy
Cryptography
cryptographic primitives
computer network security
CoAP resources
authorization
authorisation
authentication
biblio
Overview on vehicular ad hoc network and its security issues
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
telecommunication switching
safekeeping
Safety
security
security issues
self-configurable network connectivity
signal-weakening barrier
telecommunication network routing
telecommunication security
Roads
travel comfort
unauthorized message injection
VANET
vehicles
vehicular ad hoc networks
Vehicular ad-hoc networks (VANET)
vehicular communications
wireless links
eavesdropping
attacks
authentication
Availability
Computer crime
confidentiality
Cryptography
data privacy
data trust
active safety enhancement
information exchange
information transmission
message alteration
message routing
non-repudiation
Position based routing
preventive safety enhancement
privacy
biblio
Secure Mail using Visual Cryptography (SMVC)
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
OpenPGP
wavelet transforms
wavelet transform
wavelet decomposition
visualization
visual cryptography
transmission medium
SMVC
secure mail using visual cryptography
Receivers
receiver side
receipent mail box
public key cryptography
public key based image authentication method
pretty good privacy
personal security
CFB mode encryption
message authentication
low frequency wavelet coefficient
Internet standards
Image Processing
Heuristic algorithms
gray scale image
encryption
Electronic mail
e-mail messaging
dynamic s-box algorithm
data privacy
chaos-based image encryption algorithm
chaos based image encryption algorithm
chaos
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 10:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme
biblio
Preserving the Anonymity in MobilityFirst networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
mobile computing
user anonymity
Trusted Computing
trust issues
three-tiered approach
telecommunication security
telecommunication network routing
Routing protocols
Routing
routers
Public key
privacy preservation
privacy
MobilityFirst networks
AMF
MF networks
internet
GUID
GNRS
globally unique flat identifier
global name resolution service
future Internet architecture
data privacy
computer science
authorisation
anonymity preservation
anonymity in MobilityFirst
biblio
Driving for Big Data? Privacy Concerns in Vehicular Networking
Submitted by BrandonB on Tue, 05/05/2015 - 9:36am
Safety
Wireless communication
WAVE
vehicular networking
vehicular network technology
vehicular network
vehicular ad hoc networks
US standards
traffic surveillance
telecommunication traffic
Telecommunication standards
surveillance
automobiles
road traffic change
road traffic
privacy concerns
ITS
Intelligent vehicles
intelligent transport system
European standards
ETSI
data privacy
communicating vehicles
biblio
Security with privacy - A research agenda
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
PE applications
social media
security of data
security
Research Agenda
privacy-preserving data management
privacy-preserving data analysis
privacy-enhancing techniques
privacy
PII
personally identifiable information
PE techniques
Big Data
outsourced data
Media
encryption
Electronic mail
data sources
data privacy
cloud environment
Cloud Computing
Cancer
business intelligence
big data analysis
biblio
Information Security in Big Data: Privacy and Data Mining
Submitted by BrandonB on Tue, 05/05/2015 - 9:34am
decision maker
tracking
sensitive information
security of data
Provenance
privacypreserving data mining
privacy-preserving data mining
privacy preserving data mining
privacy auction
privacy
PPDM
information security
information protection
game theory
Algorithm design and analysis
data publishing
data provider
Data protection
data privacy
Data mining
data miner
data collector
data acquisition
computer security
Big Data
anti-tracking
anonymization
biblio
Towards adapting metamodelling technique for database forensics investigation domain
Submitted by BrandonB on Tue, 05/05/2015 - 9:34am
DBMS
software engineering domain
Servers
security
Organizations
model
metamodelling technique
Metamodelling
Metamodel
Forensics
Digital Forensics
Complexity theory
DBF metamodel
DBF complex knowledge processes
Database systems
database system integrity protection
database system confidentiality protection
database management systems
database forensics investigation domain
Database forensic investigation
Database forensic
data privacy
« first
‹ previous
…
98
99
100
101
102
103
104
105
106
next ›
last »