Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Privacy-Preserving Peer Discovery for Group Management in p2p Networks
Submitted by grigby1 on Wed, 08/11/2021 - 4:04pm
IP networks
Peer-to-peer computing
pubcrawl
policy-based governance
collaboration
resilience
Resiliency
privacy
Cryptography
data privacy
Protocols
composability
Relays
ip privacy
biblio
Metrics to Meet Security amp; Privacy Requirements with Agile Software Development Methods in a Regulated Environment
Submitted by grigby1 on Mon, 08/02/2021 - 3:41pm
Agile software development
Communication system security
data privacy
Design tools and techniques
Iterative methods
Measurement
Metrics
metrics testing
pubcrawl
real-time and embedded systems
security
Software
Software measurement
tools
US Department of Defense
biblio
Enabling Security Analysis of IoT Device-to-Cloud Traffic
Submitted by grigby1 on Mon, 08/02/2021 - 3:23pm
Cloud Computing
composability
data privacy
encryption
IoT security
Logic gates
Middleboxes
middleware
policy-based governance
privacy
Protocols
Prototypes
pubcrawl
resilience
Resiliency
Transport layer encryption
biblio
Privacy Preserving Issues in the Dynamic Internet of Things (IoT)
Submitted by aekwall on Tue, 07/27/2021 - 2:06pm
Computing Theory
privacy
blockchain
Computing Theory and Privacy
data privacy
Decision Making
Dempster-Shafer
General Data Protection Regulation
Internet of Things
IoT
Monitoring
pubcrawl
Resiliency
security
trust
biblio
An Elliptic Curve-based Protocol for Privacy Preserving Frequency Computation in 2-Part Fully Distributed Setting
Submitted by aekwall on Tue, 07/27/2021 - 2:06pm
Elliptic Curve Cryptosystem
Systems engineering and theory
secure multi-party computation
Resiliency
pubcrawl
Protocols
privacy-preserving data mining
Privacy preserving frequency computation
privacy
Knowledge engineering
theoretical cryptography
Elliptic curve cryptography
data privacy
Computing Theory and Privacy
Computing Theory
Computational efficiency
2-part fully distributed setting
Compositionality
composability
biblio
IEye: Personalized Image Privacy Detection
Submitted by aekwall on Tue, 07/27/2021 - 2:05pm
Computing Theory
privacy
Computing Theory and Privacy
data privacy
feature extraction
Image edge detection
image privacy
machine learning
Privacy definition
Privacy detection
pubcrawl
Resiliency
Semantics
visualization
biblio
Practical and Secure Circular Range Search on Private Spatial Data
Submitted by aekwall on Tue, 07/27/2021 - 2:04pm
Computing Theory
privacy
circular range search
cloud server
Computing Theory and Privacy
data privacy
encryption
index privacy
Indexes
pubcrawl
query privacy
Resiliency
search problems
Servers
spatial data
Spatial databases
biblio
Proposing Innovative Perturbation Algorithm for Securing Portable Data on Cloud Servers
Submitted by grigby1 on Thu, 07/08/2021 - 2:38pm
Program processors
user privacy in the cloud
user privacy
tools
Technological innovation
Servers
security
Scalability
Resiliency
resilience
pubcrawl
cloud
privacy
Perturbation methods
perturbation
Noise addition
Metrics
encryption
decryption
data privacy
Cloud Computing
biblio
Data Sharing for Multiple Groups with Privacy Preservation in the Cloud
Submitted by grigby1 on Thu, 07/08/2021 - 2:38pm
multiple groups data sharing
user privacy in the cloud
user privacy
Scalability
Resiliency
resilience
pubcrawl
Privacy-preserving
privacy
Access Control
Metrics
encryption
data privacy
Data models
computer science
Cloud Computing
cloud
biblio
A Secure Privacy Preserving Cloud-based Framework for Sharing Electronic Health Data*
Submitted by grigby1 on Thu, 07/08/2021 - 2:38pm
Access Control
cloud
Cloud Computing
data privacy
encryption
Metrics
outsourcing
pubcrawl
resilience
Resiliency
Scalability
user privacy
user privacy in the cloud
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »