Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Achieving privacy preservation in WiFi fingerprint-based localization
Submitted by BrandonB on Mon, 05/04/2015 - 1:23pm
location privacy
wireless LAN
WiFi fingerprint-based localization
smart phones
signal strengths
Servers
real-world environments
PriWFL
privacy-preserving WiFi fingerprint localization scheme
privacy
performance enhancement algorithm
mobile computing
Accuracy
localization service provider
indoor mobility prediction
indoor localization
IEEE 802.11 Standards
Homomorphic encryption
Databases
data privacy
Cryptography
computer network security
computational overhead reduction
Android smartphone
biblio
Effective personalized mobile search using KNN
Submitted by BrandonB on Mon, 05/04/2015 - 1:20pm
KNN
Vectors
user preferences
user preference privacy
Servers
search engines
personalized mobile search
personalization
pattern classification
Ontology
Ontologies
mobile search engine
mobile computing
Mobile communication
location search
Android based mobile
k nearest neighborhood
information retrieval
encryption techniques
data privacy
data maintaining security
Cryptography
concept extraction
concept
client-server systems
client-server architecture
clickthrough data
Classification algorithms
classification
Androids
biblio
A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?
Submitted by BrandonB on Mon, 05/04/2015 - 1:14pm
mobile computing
user privacy
unauthorized interceptions
text communication encryption
telecommunication security
smart phones
Skype
Protocols
mVoIP communications
mobile voice-over-Internet protocol
Android mobile devices
Mobile communication
lawful interceptions
Internet telephony
internet
Google
Entropy
data privacy
Cryptography
Android mobile VoIP applications
biblio
A server-based real-time privacy protection scheme against video surveillance by Unmanned Aerial Systems
Submitted by BrandonB on Fri, 05/01/2015 - 9:29am
multiple privacy servers
video surveillance images
video surveillance
video sharing
video coding
unmanned aerial systems
UAS
surveillance operator
surveillance
Streaming media
Servers
server-based real-time privacy protection scheme
sanitized video
Privacy Policy
privacy
on-board processing unit
camera software
Key Distribution
Kerberos protocol
internet
image processing algorithms
filtering strategies
filtering algorithms
Filtering
encrypted video stream
data privacy
Cryptography
cloud-based servers
cloud-based privacy servers
civilian airspace
Cameras
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 9:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
biblio
Trusted Platform Module for Smart Cards
Submitted by BrandonB on Fri, 05/01/2015 - 9:09am
near-field communication
User Centric Tamper-Resistant Device
user centric smart card ownership model
UCTD
UCOM
trusted service manager
Trusted Platform Module
Trusted Execution Environment
TEE
smart cards
security
Runtime
privacy preservation platforms
off-card trusted relationship
application provider
near field communication-based mobile phone services
multiapplication smart card initiative
Mobile handsets
Mobile communication
Hardware
global platform consumer centric model
embedded devices
deployment model
data privacy
cross-device security
computer architecture
Computational modeling
biblio
Earprint: Transient Evoked Otoacoustic Emission for Biometrics
Submitted by BrandonB on Fri, 05/01/2015 - 8:14am
replay attacks
financial transaction
human auditory system
information fusion
learning (artificial intelligence)
Linear discriminant analysis
machine learning technique linear discriminant analysis
nonstationary signal time-frequency representation
otoacoustic emissions
feature extraction
Robust Biometric Modality
sensor fusion
signal representation
TEOAE
Time-frequency Analysis
transient evoked otoacoustic emission
wavelet analysis
Access Control
falsification attacks
earprint
Data Security
data privacy
cochlea
click stimulus
biometrics (access control)
biometrics
biometric fusion
authorisation
Auditory system
advanced spoofing techniques
advance forgery methods
advanced forgery techniques
acoustic response
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
biblio
A unified model for cherishing privacy in database system an approach to overhaul vulnerabilities
Submitted by BrandonB on Thu, 04/30/2015 - 3:01pm
Inference Detection
security policy
security of data
security
privacy cherished database architecture model
intrusion tolerance subsystem
intrusion thwarting
Intrusion Detection
inference thwarting
data privacy
Handheld computers
Decision support systems
database system privacy
database static protection
Database Security Configurations
Database Security
database management systems
« first
‹ previous
…
99
100
101
102
103
104
105
106
107
next ›
last »