Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
CHTDS: A CP-ABE Access Control Scheme Based on Hash Table and Data Segmentation in NDN
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
data structures
Servers
security threats
Scalability
pubcrawl
policy-based governance
NDN environment
NDN
named data networking
information-centric networking
information caching
ICN project
hash table data structure
hash table
fine-grained access control
encryption
Access Control
data segmentation
data privacy
data management
Cryptography
CP-ABE access control scheme
CP-ABE
content publishers
content distribution
computer network security
collaboration
CipherText Policy Attribute Based Encryption
CHTDS
automation
authorisation
biblio
Pairing-Free CP-ABE based Cryptography Combined with Steganography for Multimedia Applications
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
Elliptic curve cryptography (ECC)
sub-optimal multimedia applications
Steganography
Scalability
public key cryptography
pubcrawl
policy-based governance
pairing-based computation
pairing free CP-ABE based cryptography
multimedia contents
multimedia computing
Least Significant Bit (LSB)
free CP-ABE access control scheme
encryption
encrypted data
authenticated users
Elliptic curve cryptography
digital archives
Data Security
data privacy
data ownership
data access
Cryptography
CP-ABE
collaboration
cloud services
Cloud Computing
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
biblio
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 12:31pm
central authority
collaboration
user collusion avoidance
Resists
privacy-preserving decentralized KP-ABE
key policy
decisional bilinear Diffie-Hellman assumption
decentralized KP-ABE scheme
decentralized KP ABE scheme
decentralized key policy ABE schemes
Decentralized attribute-based encryption
DBDH assumption
collusion attack
encryption
attributed-based encryption
KP-ABE
key policy attribute based encryption
policy-based governance
pubcrawl
public key cryptography
Generators
privacy
Scalability
Public key
data privacy
authorisation
biblio
Healthcare IoT: Benefits, vulnerabilities and solutions
Submitted by aekwall on Mon, 07/20/2020 - 10:55am
medical data
white box cryptography
security defense
security
reverse engineering
return oriented programming techniques
Resiliency
pubcrawl
obfuscation technique
obfuscation
Monitoring
Mobile Applications
Metrics
Medical services
Medical diagnostic imaging
Access Control
medical computing
Internet of Things
implantable medical devices
implantable health gadgets
healthcare IoT system
healthcare IoT
health care
data privacy
Cryptography
Computer crime
composability
Biomedical monitoring
authorisation
biblio
An approach of dredging the interconnected nodes and repudiating attacks in cloud network
Submitted by aekwall on Mon, 07/20/2020 - 10:46am
cloud data transmission
cloud environment
authorization
security challenges
security models
cloud computing environment
cloud service providers
Cancer
cloud computing network
pubcrawl
cloud networks attack
interconnected nodes
malignant nodes
mallicious nodes
repudiating attacks
secure transaction
white box cryptography
Peer-to-peer computing
authorisation
data privacy
telecommunication security
Cryptographic Protocols
Protocols
Resiliency
composability
security attacks
Cloud Computing
Cryptography
Metrics
privacy
Probabilistic logic
probability
security mechanisms
authentication
biblio
Privacy Preserving Big Data Publication On Cloud Using Mondrian Anonymization Techniques and Deep Neural Networks
Submitted by aekwall on Mon, 07/13/2020 - 11:07am
privacy
k-anonymity
machine learning
Mondrian anonymization techniques
Mondrian based k-anonymity approach
neural nets
Neural networks
personal data
personally identifiable information
predominant factor
high-dimensional data deep neural network based framework
privacy breach
privacy preservation
privacy preserving big data publication
privacy-preservation
protection
Resiliency
security
user privacy in the cloud
data analysis
pubcrawl
Human Factors
resilience
Scalability
Metrics
Big Data
Big Data Analytics
Cloud Computing
compromising privacy
big data privacy
data management
Data models
data privacy
data utility
Databases
deep neural networks
differential privacy
DNN
biblio
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
network threats
user privacy in the cloud
privacy-preserving Sharing
privacy-preserving means
privacy preserving
privacy exposure
cyber threat management
Cyber Threat Information
CTI data
Confidential Information Sharing and Analysis for Cyber Protection
Collaborative sharing
collaborative analysis
C3ISP Framework
attack prediction
API Gateway
data sharing
security of data
information management
data sources
Portals
internetworking
application program interfaces
Scalability
Logic gates
collaboration
cyber-attacks
Metrics
pubcrawl
Resiliency
security
data privacy
Cloud Computing
biblio
NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
recommender system
user privacy in the cloud
user privacy data
user personal information security
recommendation system
recommendation process
privacy protection algorithm
NMF-based privacy-preserving collaborative filtering
nmf
matrix elements
information science
recommender systems
Matrix decomposition
Privacy-preserving
security of data
Scalability
data privacy
collaboration
Data protection
Hybrid algorithm
Metrics
privacy
collaborative filtering
pubcrawl
Resiliency
Servers
Cloud Computing
biblio
Edge Computing for User-Centric Secure Search on Cloud-Based Encrypted Big Data
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
sensitive data
multisource Big Data search space
pattern clustering
Privacy-Preserving Big Data
pruning system
pubcrawl
Resiliency
Scalability
semantic search
Metrics
user privacy in the cloud
User-based Sampling
user-centric cloud services
user-centric search ability
user-centric search system
user-centric secure search
user-side encryption
big data security
markov chain
encryption
Encrypted Clustering
edge computing
data structures
data privacy
data control
Cryptography
cloud-based solutions
cloud service providers
cloud provider
Cloud Computing
big dataset clustering
big data encryption
Big Data
biblio
The Anti-Data-Mining (ADM) Framework - Better Privacy on Online Social Networks and Beyond
Submitted by aekwall on Mon, 07/13/2020 - 11:06am
New Paradigms for Privacy
big data security
Cloud Privacy
data centers
deception
eavesdropping governments
enhanced privacy
enormous growth
Financial Terminal Privacy
financial terminal providers
Financial Terminal Security
Future of Privacy
information accumulators
big data privacy
Obfuscation for Privacy
Privacy against Ad Networks
Privacy against timing attacks
Search Engine Privacy
sensitive data suppression
social network
social-bots
unprecedented growth
user privacy
users privacy
user privacy in the cloud
obfuscation
Big Data
data privacy
security
Resiliency
pubcrawl
privacy
Facebook
online social networks
social networking (online)
Metrics
Data mining
Scalability
Cloud Computing
Cloud Security
search engines
disinformation
ADM
Adversarial Face Detection
Adversarial Face Recognition
Adversarial Machine Learning
adversaries
Advertising Privacy
Anti-Data-Mining
anti-data-mining principle
« first
‹ previous
…
49
50
51
52
53
54
55
56
57
…
next ›
last »