Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
Submitted by grigby1 on Mon, 03/23/2020 - 4:16pm
pubcrawl
Web server
untrusted networks
untrusted environments
telecommunication control
tailoring onion routing
Servers
secret supply chain procedures
Routing
Router Systems Security
resource-constrained IoT devices
resource-conserving access control
Resiliency
resilience
computer network security
Protocols
protocol incompatibilities
Metrics
IoT device owner
IoT communication
Internet of Things
Internet connectivity
end-to-end security
data privacy
Cryptography
Cryptographic Protocols
cryptographic processing
biblio
Learning Automata Based Secure Multi Agent RFID Authentication System
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
RFID tags
RFIDs
utility function
technological developments
Scyther
RFID technologies
RFID scenario
multiagent intelligent system
Multi Agent
long term benefit
learning automata
expertly transfer utility
automata based secure multiagent RFID authentication system
RFID system
security
radiofrequency identification
sensitive data
RFID
authentication
privacy
multi-agent systems
radio frequency identification
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
biblio
An Effencient Improvement of RFID Authentication Protocol Using Hash Function ZKP
Submitted by aekwall on Mon, 03/23/2020 - 1:33pm
elliptical curve cryptographic solutions
RFIDs
Schnorr identification protocol
RFID security
RFID privacy
RFID authentication protocol
RFID Authentication
radio frequency identification technology
MITM
Keccak hash function
Hash function ZKP
Hash Function
Elliptical Curve Cryptography
data privacy
RFID system
RFID technology
radiofrequency identification
privacy protection
object detection
man-in-the-middle attack
public key cryptography
privacy attacks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
biblio
Demo: DroidNet - An Android Permission Control Recommendation System Based on Crowdsourcing
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
technical expertise
recommendation
mobile application security
expert users
DroidNet
crowdsourcing
crowd-sourced Android recommendation tool
apps
application
app
Android permission control recommendation system
Permission
recommender systems
Android (operating system)
android
security of data
Web Application Security
smart phones
smartphone
control systems
Data mining
tools
internet
Databases
privacy
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
Monitoring
biblio
Research on Privacy Security Risk Evaluation of Intelligent Recommendation Mobile Applications Based on a Hierarchical Risk Factor Set
Submitted by aekwall on Mon, 03/23/2020 - 1:31pm
Human Factors
security of data
risk evaluation
recommender systems
pubcrawl
privacy security
network security
mobile computing
Mobile Applications
IR App
intelligent recommendation mobile application
intelligent recommendation
Intelligent Data and Security
hierarchical risk factor set
hierarchical factor set based privacy security risk evaluation method
hierarchical
data privacy
Data mining
data lifecycle factors
consumer privacy security
Scalability
Resiliency
Compositionality
Intelligent Data Security
biblio
Privacy-Enabled Recommendations for Software Vulnerabilities
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
recommender systems
vulnerability profiles
vulnerability prioritization data
software vulnerabilities
software reliability
Software
slow process
SGX
security of data
security
Scalability
Resiliency
Complexity theory
recommender system
recommender
pubcrawl
privacy-enabled recommendations
privacy
Organizations
malicious operator
Human Factors
data privacy
data integrity
costly process
biblio
Privacy Usability of IPTV Recommender Systems
Submitted by aekwall on Mon, 03/23/2020 - 1:30pm
Cryptography
data privacy
Human Factors
IPTV
IPTV recommender systems
privacy
privacy-preserving designs
pubcrawl
recommender systems
Resiliency
Scalability
TV programs
usability
usability properties
user privacy breach
biblio
Cyberthreat Hunting - Part 1: Triaging Ransomware using Fuzzy Hashing, Import Hashing and YARA Rules
Submitted by aekwall on Mon, 03/23/2020 - 1:25pm
static analysis
Locky
program diagnostics
pubcrawl
Ransomware
ransomware pandemic prevention
SDHASH
Semantics
Similarity Preserving
SSDEEP
invasive software
Syntactics
System performance
Triaging
triaging performance
triaging ransomware
WannaCry
WannaCryptor
YARA rules
CryptoWall
Resiliency
Metrics
Fuzzy Cryptography
Cer-ber
Cerber
composability
Context-Triggered Piecewise Hashing
Cryptography
Scalability
cyberthreat hunting
data privacy
dynamic analysis
Engines
file organisation
Fuzzy Hashing
IM-PHASH
Import Hashing
biblio
A Nobel Cryptosystem for Group Data Sharing in Cloud Storage
Submitted by grigby1 on Wed, 03/18/2020 - 12:28pm
data user
Secure File Sharing
resilience
Resiliency
pubcrawl
security and privacy
private files
private data sharing
mutually established secret key
Hash Function
file identifier
encrypted file
Cryptography
data owner
cryptosystem
cloud storage
cloud service provider
Aggregates
group data sharing
storage management
Servers
data privacy
Cloud Computing
encryption
biblio
A Platform for Private and Controlled Spreadsheet Objects Sharing
Submitted by grigby1 on Wed, 03/18/2020 - 12:26pm
groupware
Secure File Sharing
resilience
Resiliency
pubcrawl
tabular data
spreadsheets collaborative authoring applications
Spreadsheets
Spreadsheet programs
spreadsheet objects sharing
spreadsheet file sharing
sensitive data sharing
Secure spreadsheet data sharing
privacy
office automation
Cryptography
Data visualization
data storage
data integrity
data analysis
confidential data exchange
Computer supported collaborative work
collaborative editing
collaborative analytics
business data processing
storage management
Protocols
data privacy
authorisation
« first
‹ previous
…
61
62
63
64
65
66
67
68
69
…
next ›
last »