Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
anonymity
biblio
To Extend or Not to Extend: On the Uniqueness of Browser Extensions and Web Logins
Submitted by grigby1 on Wed, 01/16/2019 - 2:33pm
pubcrawl
Human behavior
Metrics
Resiliency
anonymity
Fingerprinting
uniqueness
Web Tracking
Web Browser Security
Compositionality
biblio
Anonymity Services Tor, I2P, JonDonym: Classifying in the Dark
Submitted by grigby1 on Wed, 09/12/2018 - 11:15am
security of data
Naive Bayes
network traffic
pattern classification
privacy
pubcrawl
public dataset
Relays
security
machine learning
sole statistical features
specific anonymity tool
statistical analysis
telecommunication traffic
tools
Tor
Traffic classification
users privacy
dark web
anonymity services
Bandwidth
Bayes methods
Bayesian network
belief networks
classifiers
communication content
Cryptography
anonymity
data privacy
encryption
Human behavior
Human Factors
I2P
internet
JonDonym
learning (artificial intelligence)
biblio
Microblogging in a Privacy-Preserving Way
Submitted by grigby1 on Thu, 08/23/2018 - 11:36am
anonymous messaging
anonymity
bluetooth security
composability
Homomorphic encryption
Human behavior
human factor
Microblogging
ORAM
privacy
pubcrawl
resilience
Resiliency
biblio
Providing Privacy, Safety, and Security in IoT-Based Transactive Energy Systems Using Distributed Ledgers
Submitted by grigby1 on Wed, 05/30/2018 - 4:08pm
anonymity
blockchain
Human Factors
Internet of Things
privacy
pubcrawl
security
Smart Grid
smart grid consumer privacy
transactive energy
transactive microgrid
biblio
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm
Submitted by grigby1 on Wed, 05/30/2018 - 4:04pm
input addresses
signature based defense
Servers
Scalability
ring signature algorithm
ring signature
Resiliency
resilience
Public key
pubcrawl
Protocols
perceived anonymity property
output addresses
mixing service provider
mixing server
anonymity
financial data processing
electronic money
double-spending attack
digital signatures
decentralized digital currency
Cryptographic Protocols
complete transaction history
coin mixing service
coin mixing scheme
coin mixing
central authority
Bitcoin users
Bitcoin protocol
bitcoin
biblio
Securing the Internet of Things: A Worst-Case Analysis of Trade-Off between Query-Anonymity and Communication-Cost
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Metrics
worst-case communication cost
wireless sensor networks
untrusted cloud server query
sensors
Sensor-Cloud
security
Resiliency
resilience
Query-Anonymity
query receiver-anonymity
query processing
pubcrawl
privacy
network diameter
provable security
Internet of Things security
Internet of Things
Human behavior
Games
data privacy
cyber-physical systems
composability
communication-cost
cloud-based IoT system
cloud services
Cloud Computing
authorisation
anonymity
biblio
Accumulators with Applications to Anonymity-Preserving Revocation
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
Human behavior
zero-knowledge proofs
user authentication
Theorem Proving
RSA-based dynamic accumulator
revocation functionality
revocation
Resiliency
resilience
public key cryptography
pubcrawl
Plugs
optimal communication complexity
Metrics
message authentication
membership revocation
accumulators
Heuristic algorithms
Cryptography
cryptographic applications
composability
Complexity theory
communication complexity
Braavos construction
authentication
ARC
anonymous revocation component
anonymous credentials
anonymous credential systems
anonymity-preserving revocation
anonymity
Additives
biblio
Dummy Location Selection Scheme for K-Anonymity in Location Based Services
Submitted by grigby1 on Mon, 04/02/2018 - 12:31pm
mobile computing
Servers
security of data
Security analysis
security
Resiliency
resilience
query processing
query probability
pubcrawl
probability
privacy concerns
privacy
optimization
optimisation
multiobjective optimization problem
anonymity
Metrics
low complexity dummy location selection scheme
location based services
localization information
LBS
k-anonymity
K-1 dummy locations
Human behavior
Geometry
dummy location
data privacy
composability
Complexity theory
cloaking area based algorithm
Artificial Intelligence
biblio
Implementing A Framework for Big Data Anonymity and Analytics Access Control
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
Data processing
tools
Sensitivity
Resiliency
resilience
pubcrawl
privacy protection
Metrics
MapReduce
k-anonymity
Human behavior
Hadoop ecosystems
framework standardization
data suppression
Access Control
data privacy
data management
data anonymization methods
data analysis
composability
Big Data anonymity framework
Big Data
authorization
authorisation
anonymization
anonymity
analytics access control
biblio
Research on K Anonymity Algorithm Based on Association Analysis of Data Utility
Submitted by grigby1 on Mon, 04/02/2018 - 12:30pm
K anonymity
Resiliency
resilience
Publishing
pubcrawl
Privacy preserve
principal component analysis
personal privacy information
personal identity
PCA-GRA K anonymous algorithm
optimization
Metrics
medical information systems
medical data privacy
K anonymity algorithm
Algorithm design and analysis
information loss
Human behavior
grey systems
Grey relational analysis K anonymous algorithm
feature maintenance
data utility
data privacy
data analysis
correlation coefficient
Correlation
composability
classification evaluation performance
association analysis
anonymity
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »