Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
anonymity
biblio
Collaboration-Based Location Privacy Protection Method
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
privacy protection algorithm
collaborative users
information entropy
location anonymity
location privacy
location-based
maximum anonymity value set
multihop communication
personalized anonymity
collaboration-based location privacy protection method
query block exchange
query diversity
query information
random-QBE
Services
spread spectrum communication
user collaboration
user cooperative privacy protection
Switches
Servers
pubcrawl
Human behavior
resilience
Resiliency
data privacy
privacy
composability
collaboration
quality of service
Metrics
query processing
anonymity
groupware
anonymity requirement
anonymous group
anonymous location
biblio
Broker Bridging Mechanism for Providing Anonymity in MQTT
Submitted by grigby1 on Thu, 08/13/2020 - 5:34pm
message passing
standard mechanisms
smart devices
security service
onion routing
MQTT-SN
MQTT
message exchange
dynamic broker bridging mechanism
Broker Bridging
anonymous communications
MQTT protocol
anonymity
Metrics
encryption
Routing
composability
Databases
Protocols
internet
data integrity
data privacy
data confidentiality
computer network security
Resiliency
resilience
Human behavior
pubcrawl
biblio
Trajectory Protection Scheme Based on Fog Computing and K-anonymity in IoT
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
maximum entropy methods
probability
anonymity
Trajectory
k-anonymity
cloud computing technology
k-anonymity-based dummy generation algorithms
location based services
location-based services
maximum entropy
Metrics
offline trajectory data protection
offline trajectory protection
online trajectory protection
real-time trajectory privacy protection
time-dependent query probability
trajectory protection
trajectory protection scheme
trajectory publication
transition probability
Cloud Computing
security of data
Servers
IoT
pubcrawl
Human behavior
resilience
Resiliency
security
privacy
Internet of Things
Computational modeling
Entropy
composability
mobile computing
edge computing
Fog computing
Data protection
Security analysis
biblio
Trajectory Anonymity Based on Quadratic Anonymity
Submitted by grigby1 on Thu, 08/13/2020 - 5:33pm
adjacent anonymous area
trajectory anonymous algorithm
trajectory anonymity publishing
synchronous trajectory data
Synchronous trajectory
Sensitive region
quadratic anonymity
privacy information
original Regional anonymity
original location
Location mappings
location mapping
Location area division
K-anonymous
forged location
current sensitive region
Servers
k-anonymity
Trajectory
anonymity
Euclidean distance
Metrics
Perturbation methods
Data protection
computer science
composability
data privacy
privacy
Resiliency
resilience
Human behavior
pubcrawl
biblio
Blind Certificate Authorities
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
SMTP servers
public key cryptography
public key registration
resilience
Resiliency
Scalability
SCI protocol
secure channel injection protocols
Secure-Multiparty-Computation
pubcrawl
standard email server implementations
TLS
truly anonymous systems
X.509 Certificate
zero-knowledge certificate
zero-knowledge certificate signing protocol
Zero-knowledge-Proof
Cryptographic Protocols
alice@domain.com
anonymity
anonymous messaging
anonymous proofs
authorisation
authorization
blind certificate authority
certificate binding
account ownership
data privacy
digital signatures
Electronic mail
Gmail
MPC
party encrypted communications
privacy
biblio
A Scalable (\$\textbackslashtextbackslashalpha, k\$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing
Submitted by grigby1 on Fri, 08/07/2020 - 3:47pm
big data privacy
Velocity of data
timely anonymization
scenarios efficient anonymization
Scalable k-Anonymization approach
Scalable k-Anonymization (SKA)
scalable anonymization approach
Publishing
privacy preserving big data publishing
privacy preserving approaches scalability
MapReduce based Anonymization (MRA)
k-anonymity
data publishing approaches
Credit cards
security of data
anonymity
AI
Government
Scalability
Big Data
privacy issues
privacy
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
A Flexible Secure Key Delegation Mechanism for CP-ABE with Hidden Access Structure
Submitted by grigby1 on Fri, 07/24/2020 - 12:40pm
hidden access policy
unauthorized data access
storage management
specified access control
Scalability
Public key
pubcrawl
policy-based governance
Organizations
Logic gates
key delegation
hidden access structure
Access Control
Generators
flexible secure key delegation mechanism
fine grained access control
encryption
Cryptography
CP-ABE schemes
CP-ABE
collaboration
ciphertext policy attribute
authorisation
anonymity
biblio
Resident Evil: Understanding Residential IP Proxy as a Dark Service
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
residential-ip
malware hosting
Malware-and-unwanted-software
Network-and-systems-security
proxy hosts
pubcrawl
resident evil
residential IP proxy
residential networks
residential proxy
Logic gates
residential-IP-proxy-as-a-service
residential-proxy
RESIP IP
Security-and-privacy-for-the-Internet-of-Things
server- side
Servers
underground business world
web-proxy
emerging Internet business
Companies
compromised hosts
Computer crime
computer network security
dark service
dark web
elusive gray services
Embedded-systems-security
anonymity
engineered RESIP services
Human behavior
Human Factors
illicit operations RESIP hosts
internet
Internet service
invasive software
IP networks
biblio
Hidden in the Shadow: The Dark Web - A Growing Risk for Military Operations?
Submitted by grigby1 on Fri, 07/10/2020 - 11:55am
marketplaces
US Navy
Tor
surface Web
sophisticated social engineering attacks
security of data
pubcrawl
PII
OWL Cybersecurity
OPSEC
operational security
open internet
military operations
military computing
anonymity
leaked data
internet
Human Factors
Human behavior
deep web
deanonymization
data sale
data leaks
data breaches
dark Web marketplaces
dark web
breached information
armed forces
biblio
A Trust-based Real-time Map Updating Scheme
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
fog node
privacy
Policy-Governed Secure Collaboration
policy-based governance
message source vehicle
malicious vehicles
Internet of Vehicles
high-precision map service
Global Positioning System
pubcrawl
false trust
data privacy
blockchain
Bayesian inference model
automatic driving
anonymity
accurate traffic information
Scalability
trust
traffic information systems
timely traffic information
telecommunication traffic
Sybil attack prevention
Servers
security of data
Security analysis
trust value offset
Roads
road condition information
Resiliency
resilience
real-time systems
real-time map updating
Public key
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »