Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Secure Count Query on Encrypted Heterogeneous Data
Submitted by grigby1 on Thu, 02/10/2022 - 3:19pm
applied cryptography in data security
storage management
Sequential analysis
secure cloud computing
outsourcing
heterogeneous data.
genomics
encryption
data privacy
bioinformatics
biblio
Efficient Privacy-Preserving Similarity Range Query based on Pre-Computed Distances in eHealthcare
Submitted by grigby1 on Thu, 02/10/2022 - 3:19pm
Servers
Medical services
Euclidean distance
encryption
Databases
data privacy
Cloud Computing
biblio
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data
Submitted by grigby1 on Thu, 02/10/2022 - 3:18pm
Spatial databases
Reflective binary codes
Privacy-preserving
Indexes
encryption
encrypted spatial data
data privacy
Boolean range queries
biblio
DHT-PDP: A Distributed Hash Table based Provable Data Possession Mechanism in Cloud Storage
Submitted by grigby1 on Thu, 02/10/2022 - 3:18pm
public auditing
Protocols
privacy
Peer-to-peer computing
outsourced data storage
information technology
distributed hash table
Distributed databases
data privacy
computer architecture
Cloud Computing
biblio
Comparison among Cooperation, Anonymity and Cloak Area Approaches for Preserving Privacy of IoT
Submitted by grigby1 on Wed, 02/09/2022 - 2:49pm
Peer-to-peer computing
TTP
Smart City
smart cities
security
Resiliency
resilience
pubcrawl
privacy
peer-to-peer security
peer to peer security
Metrics
IoT
Human behavior
data privacy
Cooperation
composability
Cloak area
anonymizer
anonymity
biblio
Overview of Privacy Protection Data Release Anonymity Technology
Submitted by grigby1 on Wed, 02/09/2022 - 2:48pm
Conferences
resilience
Resiliency
social networking (online)
tools
anonymity
anonymity technology
Companies
composability
Publishing
data privacy
data release
Government
Human behavior
Metrics
privacy protection
pubcrawl
biblio
Multi-Level Privacy Preserving K-Anonymity
Submitted by grigby1 on Wed, 02/09/2022 - 2:47pm
Resiliency
resilience
pubcrawl
privacy
Metrics
Measurement
k-anonymity
Human behavior
data privacy
data integrity
Costs
composability
Clustering algorithms
Asia
anonymization
anonymity
biblio
EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics
Submitted by grigby1 on Mon, 02/07/2022 - 4:43pm
Big Data
malware characterization
entropy analysis
Android malware
Malware Analysis
malware classification
automation
data analysis
malware behavior
malware
privacy
Entropy
data privacy
batteries
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
RSGX: Defeating SGX Side Channel Attack with Return Oriented Programming
Submitted by grigby1 on Fri, 02/04/2022 - 2:49pm
programming
side-channel attacks
side channel attack
SGX
Semantics
Runtime
ROP
Return Oriented Programming (ROP)
return oriented programming
resilience
rop attacks
Loading
data privacy
Conferences
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
A Supply Chain Data Supervision System Based on Parent-Children Blockchain Structure
Submitted by aekwall on Fri, 02/04/2022 - 10:32am
blockchains
Repudiation
supply chains
supply chain management
smart contract
Regulation
Parent-children chain
Government supervision
Government
blockchain
composability
Human behavior
Resiliency
Metrics
pubcrawl
data privacy
smart contracts
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »