Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Context-Oriented Privacy Protection in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 12:03pm
Metrics
WSN
wireless sensor networks
telecommunication security
security measures
security breaches
Resiliency
pubcrawl
privacy
base station
Location Privacy in Wireless Networks
location privacy
location data
Human behavior
data privacy
context-oriented privacy protection
context oriented
Compositionality
biblio
Dynamic and Disjoint Routing Mechanism for Protecting Source Location Privacy in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
energy consumption
Location Privacy in Wireless Networks
source node localization
source location privacy
protection mechanism
k disjoint paths
intermediate node selection
Energy-efficiency
dynamic and disjoint routing mechanism
DDRM
back-tracing attack
source location privacy protection
Position measurement
WSN
Compositionality
Monitoring
Heuristic algorithms
telecommunication network routing
Metrics
Routing
privacy
graph theory
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
Submitted by aekwall on Mon, 10/26/2020 - 12:02pm
Compositionality
Location Privacy in Wireless Networks
tree-based algorithm
source location privacy routing schemes
SLP routing schemes
routing scheme algorithms
routing algorithms
representative schemes
privacy protection level
network lifetime performance
lowest network lifetime
highest influence
angle-based algorithm
source location privacy
Phantoms
Position measurement
data privacy
energy consumption
network lifetime
telecommunication network routing
Mathematical model
trees (mathematics)
Metrics
Computational modeling
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
biblio
An Efficient Location Privacy Scheme for Wireless Multimedia Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 12:01pm
Routing protocols
Location Privacy in Wireless Networks
wireless multimedia sensor networks
unobservability scheme
Source/Sink Location Anonymity
multimedia processing technique
location privacy scheme
Global Attacks
cross-layer design
Contextual Privacy
Image Processing
Multimedia communication
Compositionality
energy consumption
authentication
delays
Intrusion Detection
multipath routing
telecommunication network routing
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data encryption
security
data privacy
Cryptography
authorisation
biblio
A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETs
Submitted by aekwall on Mon, 10/26/2020 - 11:56am
location privacy preservation
wireless communication technologies
vehicular ad hoc networks
vehicles location privacy protection
VANET
telecommunication security
safety applications
Resiliency
pubcrawl
pseudonym
Metrics
beacons message broadcasting
Location Privacy in Wireless Networks
location privacy
Human behavior
group based dynamic mix zone scheme
group
dynamic mix zone
dedicated short range communication
data privacy
Compositionality
biblio
Source-Location Privacy Based on Dynamic Mix-Ring in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
Metrics
Location Privacy in Wireless Networks
source-location privacy
dynamic mix-ring
Position measurement
Wireless communications
WSNs
routing algorithm
Compositionality
Heuristic algorithms
statistical analysis
Monitoring
Routing
privacy
wireless sensor networks
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
Location Privacy Protection of WSN Based on Network Partition and Angle
Submitted by aekwall on Mon, 10/26/2020 - 11:55am
angle
Location Privacy in Wireless Networks
source location privacy protection
source location
phantom source nodes
phantom source
phantom routing algorithm
network partition
hop node
geographic location
forwarding path
data privacy
WSN
Compositionality
telecommunication network routing
Metrics
wireless sensor networks
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
A Demonstration of Privacy-Preserving Aggregate Queries for Optimal Location Selection
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Protocols
Business
query processing
Metrics
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
service providers
Cryptographic Protocols
security
data privacy
encryption
Servers
vertical businesses
wireless services
Location Privacy in Wireless Networks
collected location data
privacy-preserving aggregate queries
privacy preserving solutions
partially homomorphic cryptosystem
optimal location selection
mobile operators
location-based queries
enormous extent
demonstration
sensitive data
mobile phones
organization
Aggregates
location information
private data
Homomorphic encryption
Compositionality
biblio
Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
Base stations
Location Privacy in Wireless Networks
source location privacy
signal strength
routing schemes
routing information
packet delivery
Location Privacy breach
incoming packet
dummy traffic
dummy packets
delay
base station
Phantoms
privacy breaches
TTL
telecommunication traffic
Compositionality
sensors
encryption techniques
telecommunication network routing
Metrics
Cryptography
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
security architecture
Location Privacy in Wireless Networks
source location protection
Smart IoT
protecting source-location privacy scheme
Privacy Protections
multi-sinks
critical problems
CPSLP scheme
attack modes
source location privacy
cloud-based
Position measurement
daily activities
Transforms
Compositionality
Cloud Computing
probability
telecommunication network routing
Metrics
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
security
telecommunication security
data privacy
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »