Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Security System Analysis in Combination Method: RSA Encryption and Digital Signature Algorithm
Submitted by grigby1 on Fri, 02/08/2019 - 4:21pm
Resiliency
Human behavior
information
information and communication systems
Metrics
pubcrawl
Public key
public key cryptography
public key cryptography system
resilience
encryption process
Rivest
RSA
RSA 1024
RSA algorithm
RSA encryption
Scalability
security
security system analysis
Shamir
digital signature
Asymmetric Encryption
asymmetric keys
authentication
combination method
Communication networks
composability
Compositionality
Data Security
decryption process
and Adleman algorithm
digital signatures
digital signature algorithm
Digital Signature Standard
DSA
DSA 512
DSA algorithms
DSS
encryption
biblio
Securing Data in Cloud Computing by Classification
Submitted by grigby1 on Mon, 12/03/2018 - 12:18pm
pubcrawl
classification
Cloud Computing
cloud storage
Data Security
Metrics
resilience
Resiliency
Scalability
User behavior
user privacy in the cloud
biblio
Towards Security and Privacy for Multi-User Augmented Reality: Foundations with End Users
Submitted by grigby1 on Mon, 11/19/2018 - 12:14pm
Microsoft HoloLens
user studies
security
Scalability
Safety
Resiliency
resilience
pubcrawl
privacy
multiuser augmented reality
multi user interaction
augmented reality
Interviews
Human behavior
HoloLens activities
Face
Data Security
data privacy
computer security
augmented reality technologies
AR technologies
biblio
Security and privacy for IoT and fog computing paradigm
Submitted by grigby1 on Fri, 10/26/2018 - 4:47pm
heterogeneous ecosystem
Trust management
smart objects
security challenges
Scalability
risk-based trust management model
Resiliency
pubcrawl
Protocols
privacy issues
privacy
IoT
Internet of Things
human privacy
authentication
fog computing paradigm
Fog Computing and Security
Fog computing
edge computing
distributed processing
Data Security
data privacy
computing clouds
computer network security
Computational modeling
Cloud Computing
cameras etc
biblio
A data protection model for fog computing
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
fog-based privacy-aware role based access control
security of data
security
Scalability
Resiliency
region-based trust-aware model
RBTA model
pubcrawl
Mobility
IoT
Internet of Things
FPRBAC
Access Control
fog security
fog location
Fog computing
edge computing
Data Security
data protection model
Data protection
Data models
Computational modeling
Cloud Computing
biblio
Fog computing and security issues: A review
Submitted by grigby1 on Fri, 10/26/2018 - 4:45pm
Data Security
security of data
privacy
mobile computing
IoT
Internet of Things
IDS
fog computing technology
edge computing
DoS
pubcrawl
data privacy
computing services
Computers
cloud computing paradigm
Cloud Computing
Scalability
Resiliency
security
Fog computing
biblio
A Privacy Preserving Model for Energy Internet Base on Differential Privacy
Submitted by grigby1 on Fri, 09/28/2018 - 11:57am
Monitoring
user behavior privacy
Sensitivity
Scalability
Resiliency
pubcrawl
privacy preserving model
privacy preserving data release
privacy preserving data mining
privacy preserving
privacy
power engineering computing
nonintrusive load monitoring
Non-intrusive Load Monitoring
NILM
Algorithm design and analysis
Load management
Human behavior
Exponential distribution
energy Internet privacy protection
energy internet
electrical data use analysis
differential privacy
Data Security
Data protection
data privacy
Data mining
data availability
composability
batteries
biblio
Study on Data Security Policy Based on Cloud Storage
Submitted by grigby1 on Thu, 08/23/2018 - 11:43am
Data models
user data security risk analysis
storage management
Servers
security policy
security of data
Secure storage
pubcrawl
network storage technology
data security policy
Data Security
Cloud Computing
data leakage
Cryptography
Computational modeling
computational intelligence
Compositionality
composability
cloud storage system structural characteristics
cloud storage security policy
cloud storage
cloud computing environment
biblio
Impact of unreliable positioning in location-based routing protocols for MANETs
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
unreliable positioning
tools
Routing protocols
Routing Protocol
Routing
Resiliency
resilience
quality of service
pubcrawl
privacy
positioning error
node scalability
network overhead
network lifetime
Ad hoc networks
mobile ad hoc networks
Metrics
MANET
location-based routing protocols
Energy Efficiency
effective routing
DYMOselfwd
DYMO
Data Security
data privacy
Compositionality
AODV-Line
AODV
biblio
CAre: Certificate Authority Rescue Engine for Proactive Security
Submitted by grigby1 on Thu, 06/07/2018 - 3:14pm
online front-ends
Web site security
Web servers
web security
SSL Trust Models
SSL technology
Scalability
Resiliency
resilience
public key infrastructure
public key cryptography
Public key
pubcrawl
proactive security
Browsers
Metrics
internet
Human behavior
encryption
digital signatures
Data Security
Cryptography
certification
Certificate Authority Rescue Engine
certificate authority
certificate authorities
centralized system
CAre
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »