Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
A Trust-based Real-time Map Updating Scheme
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
fog node
privacy
Policy-Governed Secure Collaboration
policy-based governance
message source vehicle
malicious vehicles
Internet of Vehicles
high-precision map service
Global Positioning System
pubcrawl
false trust
data privacy
blockchain
Bayesian inference model
automatic driving
anonymity
accurate traffic information
Scalability
trust
traffic information systems
timely traffic information
telecommunication traffic
Sybil attack prevention
Servers
security of data
Security analysis
trust value offset
Roads
road condition information
Resiliency
resilience
real-time systems
real-time map updating
Public key
biblio
Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
Homomorphic encryption
storage management
Servers
security
Scalability
Resiliency
pubcrawl
Metrics
matrix multiplication
Matrix converters
information security
Human Factors
Ciphers
extended hill cipher encryption
Extended Hill Cipher
encryption algorithm
encryption
data storage
data privacy
Cryptography
cloud storage
cloud providers
cloud network
Cloud Computing
biblio
Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications
Submitted by grigby1 on Thu, 06/04/2020 - 11:47am
SPS threats
Safety
safety risk assessment
security
security risk assessment
Servers
social aspects of automation
Social Virtual Reality
Solid modeling
risk management
three-dimensional immersive computer experience
trees (mathematics)
user experience
virtual reality
virtual reality learning environment
VR technology
VRLE system
vSocial VRLE
immersive systems
attack tree
attack tree formalism
composability
computer based training
cyber physical systems
data privacy
educational user experience
Human Factors
adhoc attack tree
IoT Application Testbed
privacy
Privacy Control
privacy-preservation
pubcrawl
real-time systems
resilience
Resiliency
biblio
Proving Erasure
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
privacy amplification.
users
storage management
Servers
server hosting data
Scalability
Resiliency
resilience
remote hosting service
remote data storage
Quantum mechanics
quantum cryptography
pubcrawl
provable deletion
Protocols
privacy delegation
data deletion
policy-based governance
Metrics
information-theoretically
information-theoretic security
information theoretic security
Human Factors
Human behavior
encryption
eavesdropping
definite deletion
data storage
data privacy
Cryptography
BB84-like protocol
biblio
Distributed and Private Coded Matrix Computation with Flexible Communication Load
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
master server
matrix multiplication
Metrics
multiple workers
nonsecure versions
policy-based governance
private coded matrix computation
pubcrawl
recovery threshold
learning (artificial intelligence)
Resiliency
Scalability
secret sharing
secure generalized PolyDot codes
security
security constraint
Servers
telecommunication security
tensor operations
encoding
colluding workers
computational delay
convolution
data privacy
delays
distributed computing platform
Distributed databases
distributed learning
distributed platforms
Coded distributed computation
flexible communication load
flexible trade-off
Human behavior
Human Factors
information theoretic security
information theoretic security.
input data matrices
large-scale machine learning applications
biblio
A Multi-factor Biometric Authentication Scheme Using Attack Recognition and Key Generator Technique for Security Vulnerabilities to Withstand Attacks
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
key generator technique
World Wide Web
withstand external attacks
security vulnerabilities
security
Resiliency
resilience
pubcrawl
password
multifactor biometric authentication scheme
multifactor authentication
Multi-factor authentication
Metrics
attack recognition
internet
information sharing
Human Factors
Human behavior
Fingerprint recognition
Databases
Data Security
data privacy
Communication networks
biometrics (access control)
biometric
authorisation
biblio
An Extensive Formal Analysis of Multi-factor Authentication Protocols
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
Protocols
Metrics
multifactor authentication
multifactor authentication protocols
P ROVERIF tool
password
Phishing
pi calculus
protocol analysis attackers
message authentication
pubcrawl
resilience
Resiliency
Servers
threat model
threat scenarios
users authentication
authentication
malwares
invasive software
Human Factors
Human behavior
Google 2-step
Google
FIDO U2F
extensive formal analysis
data privacy
Cryptographic Protocols
Computer crime
Communication Network
automated protocol analysis
authorisation
authentication mechanisms
biblio
Improved IoT Device Authentication Scheme Using Device Capability and Digital Signatures
Submitted by aekwall on Mon, 06/01/2020 - 11:03am
IoT device authentication scheme
Servers
security perspective
Resiliency
resilience
replay attack mitigation
pubcrawl
performance evaluation
multifactor authentication scheme
multifactor authentication
Metrics
man-in-the-middle attack mitigation
IoT device security
IoT device privacy
authentication
Internet-of-Things device authentication
Internet of Things
Human Factors
Human behavior
digital signatures
device capability
device authentication
data privacy
Cryptography
computer network security
authentication server
authentication mechanism
biblio
MidSecThings: Assurance Solution for Security Smart Homes in IoT
Submitted by aekwall on Mon, 06/01/2020 - 10:54am
pubcrawl
telecommunication security
standards
Smart homes
Smart Home
Servers
security-based solutions
security smart homes
security of data
security approach
security
Resiliency
resilience
Remote Patterns
authentication
privacy
policy-based governance
MidSecThings
middleware security
middleware
IoT middleware
IoT devices
IoT
Internet of Things
home automation
distributed security mechanisms
data privacy
composability
biblio
Study of security algorithms to secure IOT data in middleware
Submitted by aekwall on Mon, 06/01/2020 - 10:48am
middleware
security of data
security algorithms
Resiliency
resilience
pubcrawl
privacy
policy-based governance
middleware security
cloud
IoT data
IoT
Internet of Things
fog
data privacy
composability
Cloud System
Cloud Computing
« first
‹ previous
…
53
54
55
56
57
58
59
60
61
…
next ›
last »