Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Wireless Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
message protection
fading channels
information-theoretic security
information theoretic security
average secure communication
channel state information
Fading
imperfect channel state information
Information analysis
low-density parity-check (LDPC) codes
secure communication protocol
multilevel coding
optimized low-density parity-check codes
outage probability
Privacy Amplification
quasi static fading channel
secrecy capacity
secret key agreement
Wireless application protocol
Wireless Information-Theoretic Security
Metrics
data privacy
private key cryptography
telecommunication security
Resiliency
Human behavior
pubcrawl
policy-based governance
privacy
Communication system security
Scalability
probability
channel coding
parity check codes
Data Security
information security
wireless channels
protection
wireless channel
secret key generation
biblio
Identity-based Secret Sharing Access Control Framework for Information-Centric Networking
Submitted by aekwall on Thu, 04/08/2021 - 4:29pm
IBS
Information Centric Networks
polynomials
user privacy
secret sharing
telecommunication network planning
Identity-based encryption
content distribution
IBE
information-centric networking
IBSS
identity-based secret sharing access control framework
next generation network design
polynomial degree
request-response communication mode
secure identity encryption
Shamir's secret sharing method
pubcrawl
Scalability
Access Control
authorisation
authorization
Cryptography
encryption
data privacy
Resiliency
computer network security
privacy
internet
delays
user identity
Next generation networking
next generation networks
ICN
biblio
OLYMPUS: A distributed privacy-preserving identity management system
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
Internet of Things
service providers
security
Scalability
Resiliency
resilience
pubcrawl
Privacy-preserving
privacy enhancing technologies
privacy
OLYMPUS H2020 EU project
IoT
blanket surveillance
identity providers
Identity management
Human behavior
GDPR
distributed privacy-preserving identity management system
digital identities
data privacy
cybercrimes
Cryptography
computer network security
Computer crime
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
pubcrawl
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
Identity-of-Things (IDoT)
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
distributed identity management model
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
Access Control
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
biblio
Identity management using permissioned blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
public key cryptography
identity cards
Identity management
identity management capabilities
identity thefts
India
permissioned blockchain
person identity authentication
personal data hashing
privacy
privacy concepts
private key cryptography
pubcrawl
Human behavior
public-private keys
resilience
Resiliency
Scalability
score-card
security
Self-Sovereign Identity
smart cards
smart contracts
unauthorized hands
US Home Land Security
efficient identity management
authorisation
Bitnation
blockchain technology
contracts
cryptocurrencies
data privacy
design information security
Digital India
distributed ledger
Distributed trust model
distribution control
e-Residency
Aadhar-card
Estonia
ethereum
Fabrics
financial data processing
fraud
fraud cases
Government
government agencies
government data processing
hashing algorithms
homeland security enterprise
biblio
Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems
Submitted by grigby1 on Mon, 03/29/2021 - 2:22pm
IdM
uPort
SSI ecosystem
SSI
Sovrin
Self-Sovereign Identity
Scalability
Resiliency
resilience
Reliability
pubcrawl
privacy
Principles of SSI
numerous governing principles
IDM systems
IDM system
Analytical models
identity management system
Identity management
Human behavior
federated identity management
Ecosystems
distributed ledger
digital transformation
digital services
Digital identity
digital form
data privacy
Cryptography
blockchain enabled privacy preserving identity management systems
blockchain
authorisation
biblio
Human-centric Software Engineering for Next Generation Cloud- and Edge-based Smart Living Applications
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Smart homes
Intelligent sensors
Internet of Things
next generation cloud
next-generation applications
privacy
Privacy Requirements
pubcrawl
Scalability
smart cities
smart city-related data
human-centric software engineering
smart living systems
Software
software activities
software development
software engineering
software requirements engineering
user centred design
user interfaces
visualization
edge computing applications
Cloud Computing
data analysis
data analysis applications
data privacy
data visualisation
diverse software usability defects
diversity and inclusion
domain-specific visual models
edge computing
aging
edge-based smart living applications
edge-based software systems
end user emotions
expert systems
Formal Specification
human computer interaction
Human Factors
human usage patterns
human-centric security
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
Designing Context-Sensitive Norm Inverse Reinforcement Learning Framework for Norm-Compliant Autonomous Agents
Submitted by grigby1 on Mon, 03/29/2021 - 1:15pm
Human Factors
social norm-compliant behavior
Scalability
pubcrawl
privacy norm
privacy
norm-compliant autonomous agents
multi-agent systems
Markov processes
learning (artificial intelligence)
IRL framework
autonomous agents interact
human behaviors
expert systems
expert demonstrations
ethical social norms
data privacy
context-sensitive RL
context-sensitive norm IRL
context-sensitive norm inverse reinforcement learning framework
context spaces
CNIRL
« first
‹ previous
…
21
22
23
24
25
26
27
28
29
…
next ›
last »