Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Enhanced Honey Encryption Algorithm for Increasing Message Space against Brute Force Attack
Submitted by grigby1 on Fri, 09/04/2020 - 3:24pm
Human Factors
brute force attacks
user data protection algorithm
message transmission
message space limitation problem
message space limitation
honeywords generation method
honey encryption algorithm
distribution transforming encoder
distribution probability theory
Distribution functions
discrete distribution function
cumulative distribution function
CDF
Brute Force Attack
policy-based governance
Cryptography
encoding
password
Databases
Web sites
Force
Data protection
Decoding
collaboration
pubcrawl
probability
Data Security
honey encryption
unauthorized access
authorisation
encryption
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
Security of Big Data Based on the Technology of Cloud Computing
Submitted by grigby1 on Fri, 08/28/2020 - 3:33pm
resilience
big data security in the cloud
threat perception
system security risk early warning
privacy protection method
physical level
interface layer
big data security
Application Layer
Scalability
cloud platform
security of data
Cloud Security
Metrics
blockchain
data layer
Data Security
Big Data
Cloud Computing
data privacy
Resiliency
pubcrawl
biblio
Large Scale Mobile and Pervasive Augmented Reality Games
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
quality management
multimedia data heterogeneity
network management
network middleware
pervasive augmented reality games
pervasive computing
pervasive entertainment
Pervasive networking
privacy
pubcrawl
multimedia computing
quality of service
resilience
Scalability
security
security of data
service management
telecommunication network management
telecommunication security
ubiquitous computing
entertainment
ad-hoc networking
augmented reality
computer games
consistency
Context-aware services
data distribution
Data replication
Data Security
Dynamic Configuration
Ad hoc networks
gaming
geospatial location
geospatial orientation
Hardware
Human behavior
Large-scale systems
middleware
mobile computing
mobile entertainment
biblio
Research on Feasibility Path of Technology Supervision and Technology Protection in Big Data Environment
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
privacy protection
big data privacy
technology protection
stand-alone simulation experiment
query protocol design
query privacy protection model
query mode design
potential value
Massive Data
experimental data
data privacy protection model
complexity analysis
big data platform
big data environment
Data Security
Access Control
Scalability
Human Factors
Security analysis
query processing
Metrics
privacy
pubcrawl
Resiliency
Data models
Protocols
security
data privacy
Big Data
data owners
Servers
biblio
An Internet Medical Care-Oriented Service Security Open Platform
Submitted by aekwall on Mon, 08/24/2020 - 12:46pm
convenient online services
Autonomic Security
Visualized Control
standardized connection process
Service
Security Open Platform
personal privacy data security
medical data illegal stealing
Internet medical care-oriented service security open platform
Internet hospitals
Internet Hospital
data access process
security of data
Data Security
malicious attacks
medical information systems
health care
internet
composability
pubcrawl
Resiliency
data privacy
Big Data
biblio
Analytical Evaluation of k–Anonymity Algorithm and Epsilon-Differential Privacy Mechanism in Cloud Computing Environment
Submitted by grigby1 on Thu, 08/13/2020 - 5:35pm
privacy problem
epsilon-differential privacy mechanism
evaluation
expected risks
Human behavior
k-anonymity algorithm
Metrics
privacy
privacy environment
dilemmas
privacy protection algorithms
pubcrawl
resilience
Resiliency
Runtime
security of data
unexpected risks
Data models
algorithm orientations
analytical evaluation
anonymity
anonymity algorithm
Cloud Computing
cloud computing environment
composability
data analysis
algorithm orientation
data privacy
Data Security
data segregation
Databases
differential privacy
differential privacy algorithm
differential privacy mechanism
biblio
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Data Security
searchable encryption
Resiliency
Human behavior
pubcrawl
Metrics
Cloud Security
Compositionality
Asymmetric Encryption
boolean query
biblio
Improving Privacy and Security with Fine Grained Access Control Policy using Two Stage Encryption with Partial Shuffling in Cloud
Submitted by grigby1 on Fri, 07/24/2020 - 12:51pm
data privacy
two stage encryption
Servers
security
Scalability
pubcrawl
privacy improvement
policy-based governance
outsourcing
Multi Stage encryption
KP-ABE
key policy-ABE
fine grained access control policy
encryption
Data Security
Access Control
Cryptography
CP-ABE
computer access
collaboration
cloud partial shuffling
cloud data
Cloud Computing
Ciphers
cipher text-ABE
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorisation
authentication
AES
access control model
biblio
Data Security in cloud computing using Hierarchical CP-ABE scheme with scalability and flexibility
Submitted by grigby1 on Fri, 07/24/2020 - 12:49pm
fine grained access control
SQL injection attack
SQL injection
scalable access control
Scalability
quality of service
pubcrawl
policy-based governance
Organizations
KP-ABE
key policy attribute based encryption
hierarchical CP-ABE scheme
Hierarchical CP-ABE
Attribute key
encryption
Data Security
Cryptography
CP-ABE
collaboration
cloud service provider
Cloud Computing
CipherText Policy Attribute Based Encryption
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
authorization mechanisms
authorization
authorisation
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »