Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
A New Scheme for Protecting the Privacy and Integrity of Spatial Data on the Cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
indexing
Z-curve
Spatial databases
spatial data
Resiliency
Redundancy
query processing
pubcrawl
privacy protection
Outsourced Database Integrity
Outsourced Database
Metrics
IT costs
indexing scheme
cloud
Indexes
encryption
Database Security
database querying
data redundancy
data privacy
data integrity
data centers
Cryptography
computer centres
composability
Cloud Security
Cloud Computing
biblio
A privacy-preserving multi-keyword ranked search scheme over encrypted cloud data using MIR-tree
Submitted by grigby1 on Tue, 01/16/2018 - 6:17pm
Resiliency
optimal search efficiency
Outsourced Database Integrity
outsourcing
Privacy-preserving
privacy-preserving multikeyword ranked search
pubcrawl
query generation
query processing
multi-keyword ranked search
sensitive data outsourcing
Servers
TF×IDF model
top-k search
trapdoor
tree data structures
vector space model
word-digest
data privacy
authentication
ciphertext search
Cloud Computing
cloud data
communication overhead reduction
composability
Cryptography
data integrity
authenticated data structure
database indexing
encrypted cloud data
index construction
Indexes
inverted file index
Metrics
MIR-tree
MIR-tree based index
biblio
Privacy preserving auditing for shared data in cloud
Submitted by grigby1 on Tue, 01/16/2018 - 6:16pm
Outsourced Database Integrity
TPA
third-party auditor
Third Party Auditor (TPA)
shared data integrity verification
shared data
Servers
resource allocation
Resiliency
public verifiers
pubcrawl
privacy preserving auditing
privacy preserving
outsourcing
Cloud Computing
on-demand computing resource delivery
Metrics
group signature
encryption
Databases
data storage
Data protection
data privacy
data integrity
data centers
computer centres
composability
cloud data integrity
biblio
An improved differential privacy algorithm to protect re-identification of data
Submitted by grigby1 on Wed, 01/10/2018 - 12:38pm
Human behavior
ε-differential privacy
two-layer privacy
sanitized data
Resiliency
re-identification risk
Publishing
pubcrawl
privacy
Policy
Partitioning algorithms
mining trends
Medical services
machine learning algorithms
improved differential privacy algorithm
Human Factors
Algorithm design and analysis
healthcare organizations
decision-making systems
data sharing
data set
data sanitization algorithm
Data Sanitization
data repositories
data privacy
Data mining
data donors
data custodians
customer service
credible information
Compositionality
collaboration
biblio
Privacy and Security: How to Differentiate Them Using Privacy-Security Tree (PST) Classification
Submitted by grigby1 on Thu, 12/28/2017 - 1:34pm
Metrics
security of data
Science of Security
Scalability
Resiliency
pubcrawl
PST classification
privacy-security tree classification
privacy
Policy-Governed Secure Collaboration
pattern classification
authentication
Law
information system domain
information security
information privacy
Human Factors
Human behavior
Data protection
data privacy
composability
collaboration
biblio
Two- and three-laser chaos communications
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
optical communication
two-laser chaos communications
three-laser chaos communications
telecommunication security
Synchronization
symmetrical topology
standard short cavity close-loop laser schemes
secure transmission
secure data exchange
Resiliency
pubcrawl
privacy
chaotic communication
optical chaotic cryptography
optical chaos
Metrics
laser cavity resonators
data privacy
Cryptography
composability
Communication system security
closed loop systems
chaotic cryptography
biblio
Detection of compromised email accounts used for spamming in correlation with origin-destination delivery notification extracted from metadata
Submitted by grigby1 on Wed, 12/20/2017 - 1:08pm
ODDN
Unsolicited electronic mail
unsolicited e-mail
spam messages
spam
Servers
remote SMTP server
pubcrawl
Postal services
phishing messages
Phishing
pattern classification
origin-destination delivery notification extracted
Origin-Destination Delivery Notification
authentication
metadata
IP networks
incoming junk mail detection
Human Factors
Human behavior
hacked
geographical origin
encrypted phishing
delivery status notification
data privacy
compromised email account detection
compromised email account
biblio
One-Round Provably Secure Yoking-Proof for RFID Applications
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy protection
yoking-proof
tools
RFIDs
RFID tags
RFID tagged objects
RFID tag pair
RFID applications
RFID
Resiliency
radiofrequency identification
pubcrawl
provable security
authentication
privacy model
privacy
one-round provably secure yoking-proof
one-round offline yoking-proof scheme
Moriyama security model
IoT
Internet of Things
Human Factors
Human behavior
data privacy
Cryptography
biblio
Integration of wireless sensor network and Web of Things: Security perspective
Submitted by grigby1 on Wed, 12/20/2017 - 1:02pm
Logic gates
sensor security
WSN integration
WoT security issue
Web of Things
smart thing
Sensor
security perspective
Security Challenge
Internet of Things vision
WSN
security threats
control systems
wireless sensor networks
Wireless Sensor Network
security
Wireless communication
computer network security
Computer crime
data privacy
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
biblio
Inhibiting Browser Fingerprinting and Tracking
Submitted by K_Hooper on Wed, 12/20/2017 - 11:33am
privacy
Web Tracking
Web sites
Web servers
Web pages
Web Browser Security
Web browser
user privacy
user computer
user browser experience
side-effects
Resiliency
pubcrawl
Browser Fingerprinting
online front-ends
Metrics
internet
Human behavior
Fingerprint recognition
Fingerprinting Countermeasure
fingerprint identification
data privacy
browser tracking
Browsers
browser fingerprinting identification
« first
‹ previous
…
89
90
91
92
93
94
95
96
97
…
next ›
last »