Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Policy-Based De-Identification Test Framework
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
Privacy Policies
pseudonymization
privacy protection
privacy preserving
privacy models
policy-based de-identification test framework
personal privacy anonymization
General Data Protection Regulation
Domain-Specific Language
domain specific language
Distributed Information Systems
data-centered society
privacy
Data protection
Load modeling
Big Data
data privacy
Data models
Scalability
performance evaluation
Generators
Human behavior
pubcrawl
biblio
Adapting Users' Privacy Preferences in Smart Environments
Submitted by grigby1 on Fri, 04/03/2020 - 12:33pm
Internet of Things
privacy
learning (artificial intelligence)
machine learning
pubcrawl
Human behavior
data privacy
Scalability
service providers
Privacy Policies
privacy checking
Privacy Control
Privacy Preferences
smart environment
soft privacy matching mechanism
users privacy preferences
biblio
Privacy Policies Model in Access Control
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
access control management
Privacy Policies
user identification
Task Analysis
Proposals
privacy policy strategy
privacy policy model
privacy policies model
personal data privacy
Internet services
data exchange
privacy
access control language
cloud environments
information security
authorization
Scalability
data privacy
Human behavior
pubcrawl
Cloud Computing
authorisation
biblio
Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
identity protection strategies
Privacy Policies
Stochastic game
protection game
privacy protection system
privacy protection
policy iteration algorithm
policy evaluation
personal identity information
optimal policy
Iterative methods
information dynamic
privacy
evaluation framework
dynamic identity ecosystem approach
Bayesian network mathematical representation
identity theft
Identity Ecosystem
Scalability
data privacy
Human behavior
pubcrawl
security of data
belief networks
biblio
Privacy Is The Best Policy: A Framework for BLE Beacon Privacy Management
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
BLE Beacon Privacy management
Privacy Policies
user-driven privacy policy configuration
user experience
User behavior
trustworthy privacy management
Receivers
proof-of-concept app
Policy Management
policy configuration platform
bluetooth low energy beacon
bluetooth low energy
BLE signals
BLE Beacons
Internet of Things
beacon privacy manager
advertising
telecommunication network management
telecommunication computing
smart phones
Privacy Policy
Scalability
data privacy
telecommunication security
Human behavior
pubcrawl
Bluetooth
privacy
biblio
Securing Big Data in the Age of AI
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
data privacy
security
relational database security
pubcrawl
privacy
Policy Based Governance
NoSQL databases
Metrics
machine learning
Human behavior
Data Security
Intelligent Data and Security
Data models
composability
collaboration
Big Data
Artificial Intelligence
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Abstract Model of Eavesdropper and Overview on Attacks in Quantum Cryptography Systems
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
promptly developed areas
document circulation
extended classification
human life
important directions
information confidentiality
information transactions
loophole of the device
mini-computer
non-coherent attack
open communication networks
cryptographic methods
quantum cryptography methods
quantum cryptography systems
quantum cryptosystems
quantum hacking
quantum key distribution equipment
reliable information security technology
reliable security
specific quantum systems
traditional cryptography methods
quantum computing security
Reliability
Computer crime
Scalability
data privacy
telecommunication security
Protocols
Resiliency
pubcrawl
composability
classification
Handheld computers
security of data
quantum cryptography
quantum computing
Predictive Metrics
information technologies
Quantum Key Distribution
quantum protocols
abstract eavesdropper model
coherent attack
commercially available quantum key distribution system
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
cyber physical systems
text healthcare data transferring
QRStream
healthcare organization
healthcare activities
health information
health data delivery
health awareness
electronic health data transferring
privacy problems
QR codes
health care
Payloads
security problems
security of data
text analysis
Libraries
metadata
Decoding
Cryptography
pubcrawl
Resiliency
Organizations
Medical services
electronic health records
data privacy
Servers
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
« first
‹ previous
…
60
61
62
63
64
65
66
67
68
…
next ›
last »