Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
An Approach for Distributing Sensitive Values in k-Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
microdata table
simple distribution of sensitive values
simple distribution
sensitive attributes
SDSV
Resiliency
resilience
quasiidentifier group
pubcrawl
privacy guarantee
anonymity
Metrics
low sensitive values
k-anonymity
Human behavior
high-sensitive values
high-sensitive value
Entropy
data privacy
composability
biblio
Algorithm for k-anonymity based on ball-tree and projection area density partition
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Loss measurement
usability
UCI
trees (mathematics)
tree data structures
Resiliency
resilience
pubcrawl
projection area density partition
privacy
Partitioning algorithms
microdata publishing
Metrics
Adult dataset
kd-tree
k-anonymity algorithm
k-anonymity
information science
individual privacy protection
Human behavior
Gotrack dataset
data privacy
composability
Classification algorithms
ball-tree
anonymity
biblio
Empirical Performance Evaluation of QUIC Protocol for Tor Anonymity Network
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
Multiplexing
transport protocols
transport design
Tor transport layer
Tor anonymity network
Tor
QUIC protocol
QUIC
Performance
onion routers
head-of-line blocking problem
handshaking delays
Google protocol
empirical performance evaluation
Anonymity Network
sockets
security
Relays
anonymity
Metrics
public domain software
Kernel
delays
composability
Protocols
internet
data privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Collaboration-Based Location Privacy Protection Method
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
privacy protection algorithm
collaborative users
information entropy
location anonymity
location privacy
location-based
maximum anonymity value set
multihop communication
personalized anonymity
collaboration-based location privacy protection method
query block exchange
query diversity
query information
random-QBE
Services
spread spectrum communication
user collaboration
user cooperative privacy protection
Switches
Servers
pubcrawl
Human behavior
resilience
Resiliency
data privacy
privacy
composability
collaboration
quality of service
Metrics
query processing
anonymity
groupware
anonymity requirement
anonymous group
anonymous location
biblio
Broker Bridging Mechanism for Providing Anonymity in MQTT
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
message passing
standard mechanisms
smart devices
security service
onion routing
MQTT-SN
MQTT
message exchange
dynamic broker bridging mechanism
Broker Bridging
anonymous communications
MQTT protocol
anonymity
Metrics
encryption
Routing
composability
Databases
Protocols
internet
data integrity
data privacy
data confidentiality
computer network security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Trajectory Anonymity Based on Quadratic Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
adjacent anonymous area
trajectory anonymous algorithm
trajectory anonymity publishing
synchronous trajectory data
Synchronous trajectory
Sensitive region
quadratic anonymity
privacy information
original Regional anonymity
original location
Location mappings
location mapping
Location area division
K-anonymous
forged location
current sensitive region
Servers
k-anonymity
Trajectory
anonymity
Euclidean distance
Metrics
Perturbation methods
Data protection
computer science
composability
data privacy
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
Submitted by grigby1 on Thu, 08/13/2020 - 5:22pm
revocation overhead
privacy
privacy-preserving authentication
private key cryptography
pseudonymous certificates
pseudonyms
pubcrawl
Public key
resilience
Resiliency
n) threshold secret sharing
Roads
Scalability
secret sharing
Shamir (t
telecommunication security
VANET
vehicular ad hoc networks
vehicular communications
DCS schemes
anonymous messaging
authentication
authentication overhead
authorisation
backward security
certificate revocation list
certificate updating overhead
CPPT
data privacy
anonymous communications
ECPP scheme
EMAP scheme
forward security
framed attacks
hash chain
hash chains
hybrid scheme
message authentication
biblio
Blind Certificate Authorities
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
SMTP servers
public key cryptography
public key registration
resilience
Resiliency
Scalability
SCI protocol
secure channel injection protocols
Secure-Multiparty-Computation
pubcrawl
standard email server implementations
TLS
truly anonymous systems
X.509 Certificate
zero-knowledge certificate
zero-knowledge certificate signing protocol
Zero-knowledge-Proof
Cryptographic Protocols
alice@domain.com
anonymity
anonymous messaging
anonymous proofs
authorisation
authorization
blind certificate authority
certificate binding
account ownership
data privacy
digital signatures
Electronic mail
Gmail
MPC
party encrypted communications
privacy
biblio
An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
Protocols
wireless environment
verifiable secret sharing(VSS)
verifiable secret sharing
vehicular ad hoc networks
Vehicular ad hoc network(VANET)
VANET
Traffic Safety
telecommunication traffic
telecommunication security
Security analysis
Scalability
Resiliency
resilience
pubcrawl
anonymous conditional authentication scheme
privacy-preserving requirements
privacy-preserving authentication scheme
Privacy-preserving
privacy
mutual authentication phase
message generation
message authentication code(MAC)
message authentication code
message authentication
data privacy
Cryptography
communication overhead
authentication
anonymous messaging
biblio
HSDC–Net: Secure Anonymous Messaging in Online Social Networks
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
Scalability
messaging application providers
online social networks
practical protocol
privacy
protocol design
Protocols
pubcrawl
resilience
Resiliency
message senders
SDC-net
secure anonymous messaging
security issues
Servers
short stability issue
social networking (online)
strongest anonymity guarantees
trust ISP
DC–net
anonymous communications
anonymous messaging
Australia
blockchain users
computer network security
Cryptographic Protocols
Cryptography
data privacy
DC-net suffers
anonymization
dining cryptographers network protocol
disruption management
disruption management subprotocols
hiding contents
HSDC-net achieves low latencies
HSDC-net protocol
internet
message publishing
« first
‹ previous
…
45
46
47
48
49
50
51
52
53
…
next ›
last »