Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
anonymity
biblio
An Identity Privacy Protection Strategy in Vehicle Named Data Network
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
malicious nodes
vehicular ad hoc networks
vehicle opportunity network
vehicle named data network
Security analysis
Scalability
ring signature scheme
Resiliency
resilience
pubcrawl
privacy protection
privacy problems
ONE-based VNDN platform
Named Data Network Security
anonymity
internet
interest packages
Identity Security
identity privacy protection strategy
identity information
Human behavior
digital signatures
data requester
data provider
data privacy
data packets
data names
computer network security
biblio
An Improved Privacy Protection Method Based on k-degree Anonymity in Social Network
Submitted by aekwall on Mon, 04/20/2020 - 10:31am
Metrics
structural modifications
social networking (online)
social network
Publishing
pubcrawl
privacy protection
privacy models and measurement
privacy
pattern clustering
original social network
node degrees
network theory (graphs)
network structure stable
network nodes
anonymity
Mathematical model
Loss measurement
k-subgraph method
k-degree anonymous graph
k-degree anonymity
k-anonymity
information losses
information loss
improved privacy protection method
graph theory
data privacy
computer security
Clustering algorithms
anonymity models
biblio
Configurable Anonymous Authentication Schemes For The Internet of Things (IoT)
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
pervasive computing devices
user anonymity
user privacy
encoding
cloud-based servers
configurable anonymous authentication schemes
device-user authentication parameters
IoT authentication
IoT testbed
power consumption
privacy-preserving authentication schemes
smart home occupancy
VCSE-based approach
verifiable common secret encoding
zero knowledge proof
ZKP-based approach
zero trust
computer network security
Human Factors
IoT infrastructure
radiofrequency identification
anonymity
authentication
Cryptography
privacy
policy-based governance
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
Scalability
file
Neural Netword Prediction of Censorable Language
Submitted by Chris Leberknight on Tue, 01/07/2020 - 11:46am. Contributors:
Chris Leberknight
Anna Feldman
Project Slides
network security
anonymity
censorship
1704113
SaTC PI Meeting 2019
biblio
Peeling the Onion's User Experience Layer: Examining Naturalistic Use of the Tor Browser
Submitted by grigby1 on Thu, 01/02/2020 - 2:41pm
anonymity
expert systems
Human Factors
privacy
pubcrawl
Scalability
Tor
Tor browser
usability
user experience
UX
biblio
Betweenness Centrality and Cache Privacy in Information-Centric Networks
Submitted by grigby1 on Mon, 11/04/2019 - 12:40pm
anonymity
anonymity set
betweenness centrality
cache privacy
caching
ICN
information-centric networking
Metrics
Named-Data Networking
NDN
pubcrawl
resilience
Resiliency
Router Systems Security
timing attacks
biblio
Location Privacy Protection with a Semi-honest Anonymizer in Information Centric Networking
Submitted by aekwall on Mon, 08/05/2019 - 10:43am
Information Centric Networks
location
ICN
pubcrawl
privacy
anonymity
Resiliency
Scalability
biblio
Obscuro: A Bitcoin Mixer Using Trusted Execution Environments
Submitted by aekwall on Mon, 03/18/2019 - 9:51am
Scalability
Human behavior
pubcrawl
bitcoin
Intel SGX
anonymity
Mixer
trusted execution environments
bitcoin security
biblio
Classification for Authorship of Tweets by Comparing Logistic Regression and Naive Bayes Classifiers
Submitted by aekwall on Mon, 03/04/2019 - 10:46am
regression analysis
machine learning techniques
Metrics
mobile phone
Naive Bayes
naïve Bayes classifier
pattern classification
pre-processed data
privacy
pubcrawl
Python
machine learning model
security
social computing
social media
social networking (online)
text analysis
text classification
Training
tweets authorship
Twitter
Twitter account
fake news
attribution
authorisation
authorship attribution
authorship attribution techniques
Bayes methods
classification
composability
digital identities
dubious sources
Electronic mail
anonymity
feature extraction
feature vector
Human behavior
human-in-the-loop security center paradigm
learning (artificial intelligence)
logistic regression
logistic regression based classifier
Logistics
machine learning
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »