Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Sovrin Network for Decentralized Digital Identity: Analysing a Self-Sovereign Identity System Based on Distributed Ledger Technology
Submitted by aekwall on Fri, 09/30/2022 - 1:38pm
DDID
Verifiable Credential
VC
UserCentric Identity
SSI
Sovrin Network
Self-Sovereign Identity
IdM
identity management system
Hyperledger Indy
DID
Decentralized IDentifier
Decentralized Digital Identity
Measurement
Identity management
network architecture
process control
Human behavior
Resiliency
pubcrawl
Analytical models
distributed ledger
Scalability
data privacy
privacy
blockchain
biblio
BioCanCrypto: An LDPC Coded Bio-Cryptosystem on Fingerprint Cancellable Template
Submitted by grigby1 on Tue, 09/20/2022 - 1:34pm
feature extraction
pubcrawl
Metrics
resilience
Conferences
Scalability
privacy
data privacy
Fingerprint recognition
Redundancy
parity check codes
Resiliency
Fuzzy Cryptography
biblio
Privacy Protection Method for Experts' Evaluation Ability Calculation of Peer Review
Submitted by grigby1 on Tue, 09/20/2022 - 12:27pm
pubcrawl
Human behavior
Scalability
privacy
data privacy
Information systems
computer security
Perturbation methods
privacy protection
usability
expert systems
Human Factors
Data Perturbation
evaluation ability
peer review
biblio
Privacy Modelling in Contact Tracing
Submitted by grigby1 on Tue, 09/20/2022 - 12:27pm
security
pubcrawl
Human behavior
Scalability
privacy
Protocols
Computational modeling
scientific computing
expert systems
data privacy
Human Factors
COVID-19
Pandemics
Electric potential
Consumer electronics
Deceases
biblio
A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT
Submitted by grigby1 on Fri, 09/16/2022 - 3:47pm
OLSR routing algorithm
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Pseudo random numbers
Pollard’s ρ
Fuzzy Cryptography
Metrics
Medical services
Internet-of-Medical Things
Fuzzy logic
Elliptic curve cryptography
data privacy
Blackhole attack
authentication
biblio
Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center
Submitted by grigby1 on Fri, 09/09/2022 - 1:54pm
cloud data center
integrity measurement
Hybrid Communication Framework
Group Verification
Resiliency
Remote Attestation
data centers
Concurrent computing
Scalability
virtualization privacy
Cloud Computing
Virtual machining
composability
data privacy
privacy
Conferences
resilience
Metrics
Human behavior
pubcrawl
biblio
Minimizing Information Leakage of Abrupt Changes in Stochastic Systems
Submitted by grigby1 on Fri, 08/26/2022 - 12:26pm
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Scalability
privacy
data privacy
Markov processes
Reinforcement learning
stochastic systems
numerical simulation
Control Theory
biblio
A Privacy-Preserving Incentive Mechanism for Federated Cloud-Edge Learning
Submitted by grigby1 on Fri, 08/26/2022 - 12:26pm
Computational modeling
Cloud-edge computing
Incentive mechanism
Control Theory
federated learning
Learning systems
optimal control
differential privacy
Games
pubcrawl
data privacy
privacy
Data models
Scalability
Resiliency
resilience
Human behavior
biblio
Designing Embodied Virtual Agent in E-commerce System Recommendations using Conversational Design Interaction
Submitted by aekwall on Fri, 08/26/2022 - 11:03am
user experience
virtual agent
User-Centered Design
system recommendation
natural conversational framework
e-commerce
conversational design interaction
and usability testing
User centered design
usability
data privacy
electronic commerce
conversational agents
faces
Prototypes
Human behavior
Metrics
Scalability
pubcrawl
biblio
Privacy Considerations for Risk-Based Authentication Systems
Submitted by grigby1 on Mon, 08/01/2022 - 1:45pm
security
IP networks
pubcrawl
Human behavior
Human Factors
authentication
privacy
data privacy
NIST
Browsers
password
usable security and privacy
two factor authentication
big data analysis
risk-based authentication
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »