Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
A Secure and Scalable Data Source for Emergency Medical Care using Blockchain Technology
Submitted by aekwall on Mon, 03/16/2020 - 10:34am
Permissioned blockchain Network
medical care providers
medical data items
medical information systems
medical record sharing
Medical services
patient care
patient care-cycle
patient data
patient Emergency relevant medical data
patient visits
patient walk
Peer-to-peer computing
hospitals
prehospital death rates
pubcrawl
Scalability
Scalable blockchain
scalable data source
Scalable Security
secure data source
security of data
Servers
trauma care
trauma centers
emergency medical care
blockchain
blockchain technology
confidentiality
continuous recording system
data audibility
data authentication
data privacy
data scalability
Data Security
distributed ledger
electronic data interchange
annual mortality rate
Emergency medical services
emergency patient death rate
emergency services
emergency-relevant medical data
Fabrics
file transfer methods
health care
health care delivery system
healthcare providers
healthcare settings
high quality prehospital care
biblio
Research on Traceability Algorithm of Logistics Service Transaction Based on Blockchain
Submitted by grigby1 on Thu, 03/12/2020 - 12:09pm
Logistics
Traceability algorithm
supply chains
supply chain security
supervision system
Stakeholders
Scalability
Resiliency
resilience
pubcrawl
multidimensional traceable data model
logistics service supply chain
Globe sandara 1
Human behavior
Globe standara 1
agricultural products
Asymmetric Encryption
blockchain
blockchain-based logistics service transaction traceability algorithm
business process
cryptocurrencies
Data Security
Distributed databases
biblio
Smart Grid Cyber Security and Substation Network Security
Submitted by grigby1 on Mon, 03/09/2020 - 2:56pm
Smart Grid Cyber Security
NIST interoperability framework process
personnel training
policy-based governance
power system security
power system simulation
pubcrawl
resilience
Resiliency
Scalability
security architecture
Metrics
Smart Grid Privacy
smart grid-related data privacy
Smart Grids
smart power grids
standards
substation network security
substation protection
Substations
ZigBee Smart Energy
Data Minimization
Advanced Metering Infrastructure (AMI)
Advanced Security Acceleration Project for the Smart Grid
Automated Data Exchange (ADE)
collaboration
composability
computer security
consumer privacy
consumer privacy audits
cyber security controls
cyber vulnerability assessments
(ASP-SG)
data privacy
Data Security
Demand Response and Smart Grid Coalition (DRSG)
electric power infrastructure
Home Area Network (HAN)
Human behavior
Human Factors
IP Security (IPSec)
Law
biblio
A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation
Submitted by aekwall on Mon, 03/09/2020 - 11:05am
computational overhead
Security Audits
TPA methods
third party auditing method
Third Party Auditing
systematic review
public auditing
Merkel hash tree method
Merkel hash tree
data integrity checking method
considerable efficiency
computation overhead
communication cost
storage management
security of data
Scalability
Cloud Security
performance evaluation
program verification
Security analysis
privacy
pubcrawl
Human behavior
Resiliency
data integrity
cloud storage
Data Security
Cloud Computing
biblio
Privacy and Security of Connected Vehicles in Intelligent Transportation System
Submitted by grigby1 on Mon, 02/17/2020 - 5:04pm
Intelligent Transportation System
sensory data
security scalability
Scalability
Roads
road vehicles
road traffic control
road side unit
pubcrawl
privacy issues
privacy
permutation
mobile computing
Compositionality
intelligent transportation
group members
group leader
encryption
data streams
Data Security
data privacy
data confidentiality
Cryptography
connected vehicles
computer security
biblio
A Usable Authentication System Using Wrist-Worn Photoplethysmography Sensors on Smartwatches
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
haemodynamics
wearables security
wrist-worn photoplethysmography sensors
true rejection rate
tendon movements
smartwatches
raw PPG signals
private consumer market
PPG sensors
photoplethysmography
muscle movements
mobile sensing
medical signal processing
hand gesture
Scalability
blood vessels
blood flow
authentication system
arterial geometry
wearable computers
patient monitoring
gesture recognition
authentication
privacy
pubcrawl
Human behavior
Resiliency
Data Security
biblio
An Empirical Study on the Data Security and Privacy Awareness to Use Health Care Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
health care wearable devices
wearables security
structural equation analysis
security practice
security knowledge
security conduct
Security Awareness
security attitude
psychological effects
private businesses
privacy awareness
physical negative effects
personal health data
patient monitoring
multilayer medical resources
medical market
security of data
health applications
psychology
medical data
National security
privacy protection
user privacy protection
health care
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data Security
Scalability
biblio
A Hypergraph-Based Key Management Scheme for Smart Charging Networking
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
key management scheme SCHKM
two-subnetwork model
telecommunication network management
smart charging network
Smart Charging
security requirements
security of data
SCHKM scheme
Scalability
Resiliency
resilience
pubcrawl
Metrics
Key storage
Cryptography
key management
key generation cost
hypergraph-based key management scheme
hypergraph theory
hypergraph structure
Human Factors
Human behavior
graph theory
electric vehicle users
electric vehicle charging
data security requirements
Data Security
biblio
Security Analysis of SAT\_Jo Lightweight Block Cipher for Data Security in Healthcare IoT
Submitted by grigby1 on Tue, 01/21/2020 - 12:04pm
cyber physical systems
Data Security
healthcare IoT
lightweight block cipher
Lightweight Ciphers
pubcrawl
resilience
Resiliency
SAT_Jo
Scalability
Security analysis
biblio
A Novel Congestion-Aware Interest Flooding Attacks Detection Mechanism in Named Data Networking
Submitted by grigby1 on Tue, 01/21/2020 - 11:26am
Information Centric Networks
telecommunication network routing
security
Scalability
Resiliency
resilience
pubcrawl
network congestion
NDN router
named data networking
IP networks
internet
interest flooding attacks
information-centric networking architectures
ICN architectures
Information Centric Network
computer architecture
computer network security
computer science
congestion-aware IFA attack detection
congestion-aware interest flooding attacks detection mechanism
data requests
Data Security
delays
Denial of Service attacks
DoS attacks
Floods
future Internet architecture
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »