Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Secure Data Packet in MANET Based Chaos-Modified AES Algorithm
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
chaotic communication
manet privacy
Wireless Ad-Hoc Networks
secure data packet
safety-sensitive applications
privacy conference meetings
passive attack
open architecture
MANET based chaos-modified AES algorithm
data packets payload
data packet
chaotic
dynamic topology
key generation
AES
Three-dimensional displays
Cryptography
Compositionality
chaos
military applications
telecommunication network topology
mobile ad hoc networks
MANET
Logistics
Metrics
privacy preservation
pubcrawl
Resiliency
telecommunication security
data privacy
encryption
biblio
Comparison of Location Privacy Protection Schemes in VANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:39pm
VANET
manet privacy
special mobile ad hoc network
road traffic.
malicious node attacks
location privacy protection schemes
trajectory privacy
Probability distribution
road traffic
Trajectory
vehicular ad-hoc networks
privacy protection
Compositionality
data privacy
Correlation
Metrics
Wireless communication
vehicular ad hoc networks
VANETs
Roads
privacy
location privacy
pubcrawl
Resiliency
Protocols
telecommunication security
biblio
Design patterns for the industrial Internet of Things
Submitted by grigby1 on Mon, 11/02/2020 - 11:41am
Industries
wireless sensor networks
sensors
security
Scalability
pubcrawl
production engineering computing
process optimization
process control
privacy concerns
object-oriented programming
leveraging multiple information sources
Internet of Things
interconnected sensors
Industry 4.0
Cloud Computing
industrial revolution
industrial property
Industrial IoT
Industrial Internet of Things
industrial control system setting
industrial control
iiot
i/o systems security
i-o systems security
Design patterns
data privacy
data flow semantics
cost reduction
biblio
Policy-Based Approach for Securing Message Dissemination in Mobile Ad Hoc Networks
Submitted by grigby1 on Thu, 10/29/2020 - 11:59am
mobile computing
telecommunication security
security
Resiliency
resilience
pubcrawl
policy based security
policy based approach
ns 2
mobile nodes
authorization
mobile ad hoc networks
mobile ad hoc network
Metrics
messages dissemination
MANETs
manet privacy
data privacy
Compositionality
biblio
Public String Based Threshold Cryptography (PSTC) for Mobile Ad Hoc Networks (MANET)
Submitted by grigby1 on Thu, 10/29/2020 - 11:57am
Public key
wireless technology
trust value
time analysis
threshold cryptography
telecommunication security
space analysis
Servers
robust cryptography scheme
Resiliency
resilience
Receivers
public string based threshold cryptography
public key cryptography
ad hoc network
pubcrawl
PSTC
mobile ad hoc networks
mobile ad hoc network
Metrics
message privacy
manet privacy
MANET
denial-of-service attack
denial of service
default threshold value
data privacy
Compositionality
biblio
Design of Data Confidential and Reliable Bee Clustering Routing Protocol in MANET
Submitted by grigby1 on Thu, 10/29/2020 - 11:57am
reliable Bee clustering routing protocol
mobile ad hoc network
mobile ad hoc networks
multihop routing
packet forwarding ratio
packet forwarding statistics
pattern clustering
pubcrawl
public key cryptography
received packets
Metrics
reliable data transmission
resilience
Resiliency
Routing
Routing protocols
secure data delivery system
sensors
telecommunication security
wireless sensor networks
ECC
Bee Ad Hoc Clustering
bee clustering approach
Bee-Ad Hoc-C
Black hole attack
clustered based approach
Compositionality
data confidential
data privacy
data reliability
overhearing
Elliptic curve cryptography
Elliptical Curve Cryptography
Energy Efficiency
ensures data confidentiality
forwarded packets
IndexTerms-Mobile Ad Hoc Networks
legion intelligence
MANET
manet privacy
biblio
Location Privacy and Changes in WiFi Probe Request Based Connection Protocols Usage Through Years
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
mobile devices security breaches
Probes
Wireless fidelity
Compositionality
wireless networks
access protocols
data leaks
Broadcast Probe Request packets
connection protocols usage
wireless LAN
passive WiFi monitoring scans
probe request
SSID
WiFi
WiFi Access Points
WiFi Probe Request packets
Location Privacy in Wireless Networks
computer network security
tracking
mobile radio
smart phones
Metrics
privacy
Mobile handsets
location privacy
pubcrawl
Human behavior
Resiliency
Protocols
IoT devices
Internet of Things
data privacy
Monitoring
biblio
Experimental Evaluation of Source Location Privacy Routing Schemes and Energy Consumption Performance
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
source location privacy
Location Privacy in Wireless Networks
route node
relatively lower energy
modified schemes
inversely proportional relationship
guarantee longer network lifetime
Experimental Evaluation
energy consumption performance
dynamic route creation process
control angle
angle-based routing
source location privacy routing schemes
routing schemes
data privacy
sensor node
Compositionality
energy consumption
Metrics
sensor nodes
wireless sensor networks
Wireless Sensor Network
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
multibranch source location privacy protection method
radiofrequency interference
WSN
source node
location privacy preservation
communication overhead
Position measurement
location security
branch interference area
location-related data
Base stations
multibranch source location privacy protection scheme
multiple branch
multiple proxy sources
proxy source
random walk
sensing information
sink location privacy
Location Privacy in Wireless Networks
privacy
data privacy
telecommunication security
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
location privacy
Monitoring
Routing
sensor nodes
Metrics
random processes
network lifetime
base station
Compositionality
privacy protection
biblio
Lifetime Analysis of Underwater Wireless Networks Concerning Privacy with Energy Harvesting and Compressive Sensing
Submitted by aekwall on Mon, 10/26/2020 - 12:03pm
lifetime analysis
underwater acoustic communication
energy harvesting
compressive sensing
civil operations
classical wireless sensor networks
improved network lifetime
integrated limited batteries
invasion detection
lifetime
compressed sensing
listening
mixed integer programming model
novel encryption decision method
silent positioning
underwater life monitoring
underwater sensor nodes
Underwater Wireless Networks
Location Privacy in Wireless Networks
energy conservation
encryption
data privacy
Resiliency
Human behavior
pubcrawl
batteries
wireless sensor networks
privacy
Cryptography
telecommunication power management
Metrics
optimization
Energy Efficiency
military operations
Compositionality
integer programming
UWSN
« first
‹ previous
…
34
35
36
37
38
39
40
41
42
…
next ›
last »