Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data privacy
biblio
Hypervisor-Based Attestation of Virtual Environments
Submitted by grigby1 on Thu, 04/20/2017 - 12:29pm
Resiliency
Virtual machining
virtual machines
Virtual machine monitors
Virtualization
virtualisation
virtual environments
Trusted Computing
TPM device
Software
scalable remote attestation scheme
attestation
pubcrawl
private cloud
NFV
network function virtualization
Metrics
hypervisor-based attestation
Hardware
data privacy
computer architecture
Cloud Computing
biblio
Partial Attestation: Towards Cost-Effective and Privacy-Preserving Remote Attestations
Submitted by grigby1 on Thu, 04/20/2017 - 12:29pm
partial attestation
Virtualization
Trusted Computing
Software measurement
security requirements
security
Seals
Resiliency
pubcrawl
privacy-preserving remote attestations
attestation
Metrics
Kernel
data privacy
cost-effective remote attestations
Cloud Computing
chain of trust
attestation protocol
attestation costs
biblio
Deploying Honeypots and Honeynets: Issue of Privacy
Submitted by grigby1 on Wed, 03/08/2017 - 2:38pm
IP networks
security
pubcrawl170114
privacy
network security
network forensics
Monitoring
legal issues
legal framework
Law
Data collection
honeypots
honeypot
honeynets
honeynet
EU law
Digital Forensics
data retention
Data processing
data privacy
biblio
Privacy-preserving functional IP verification utilizing fully homomorphic encryption
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
IP theft
system-on-chip
SoC design
sequential benchmark circuits
security parameter sizes
pubcrawl170112
privacy-preserving version
privacy-preserving functional IP verification
Noise
magnitude IP verification
Logic gates
Libraries
IP users
Cryptography
IP reuse
IP networks
IP core
intellectual property verification
industrial property
IC industry
IC design business model
globalized supply chain
functional verification
fully homomorphic encryption
encryption
data privacy
biblio
LADP: A lightweight authentication and delegation protocol for RFID tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
protocol
telecommunication security
Supply Chain
RFID tags
RFID security
RFID privacy
RFID
Resists
radiofrequency identification
PUF-enabled tags
pubcrawl170112
Protocols
authentication
privacy
physically unclonable function
ownership transfer process
owner privacy protection
lightweight authentication-and-delegation protocol
LADP
delegation
data privacy
Cryptographic Protocols
computation cost reduction
communication cost reduction
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation
biblio
A variant of schnorr signature scheme for path-checking in RFID-based supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
pubcrawl170112
telecommunication security
supply chains
supply chain management
Supply Chain
Security analysis
Schnorr signature
RFID-based supply chains
RFID technology
RFID
radiofrequency identification
authentication
Protocols
privacy analysis
privacy
path-checking protocols
path-checking
modified schnorr signature scheme
Generators
data privacy
check reader
biblio
Silicon systems security and building a root of trust
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
Monitoring
system-on-chip
system security
supply chain assurance
SoC
silicon system security
Silicon
Si
pubcrawl170112
Program processors
computer security concept
manufacturing
hardware-based roots of trust
Hardware Root of Trust
Hardware
elemental semiconductors
data privacy
Cryptography
cryptographic key
biblio
Multi-stage face recognition for biometric access
Submitted by grigby1 on Wed, 03/08/2017 - 2:14pm
face recognition
user-identification data
standards
pubcrawl170113
privacy protection
principal component analysis
performance evaluation
PCA
multistage face recognition algorithms
Multi-stage face recognition
LDA
KNN
information system protection
image classification
feature extraction
AT&T database
face image
Face
extended Yale database
EPK
ELK
Eigenvalues and eigenfunctions
eigenfaces
Databases
data privacy
classifiers
biometrics (access control)
biometric facial features
biometric access
biblio
De-identifying facial images using projections on hyperspheres
Submitted by grigby1 on Wed, 03/08/2017 - 2:13pm
facial image recognition
visualization
video sharing
social media
pubcrawl170113
privacy
Media
mass visual media distribution
malicious users
image classification
hyperspheres
automatic facial image identification
facial image deidentification
facial image classification
face recognition
Face
Error analysis
Databases
data privacy
common automatic identification algorithm
cloud services
« first
‹ previous
…
93
94
95
96
97
98
99
100
101
…
next ›
last »