Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Efficient Privacy-preserving Schemes for Dot-product Computation in Mobile Computing
Submitted by grigby1 on Mon, 06/05/2017 - 11:41am
Ad hoc networks
blind signature
Data Security
dot-product calculation
Human behavior
manet privacy
privacy preservation
pubcrawl
Repudiation
Resiliency
Scalability
biblio
Cybersecurity for product lifecycle management a research roadmap
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
encryption
three-dimensional printing
supply chain management
secure supply chains
secure collaboration techniques
research roadmap
remote 3D printing
pubcrawl170112
product lifecycle management
product life cycle management
PLM
insider threat
groupware
Access Control
embedded systems
DBSAFE
Data Security
Cybersecurity
critical protection techniques
computer security
compliance techniques
Companies
collaboration
authorisation
access control systems
biblio
Data security in Smart Grid with hardware implementation against DoS attacks
Submitted by grigby1 on Tue, 03/07/2017 - 12:37pm
IP networks
SYNflooding
SYN flooding
smart resources
smart power grids
Smart Grid
Servers
secure Web server algorithm
pubcrawl170109
Protocols
power engineering computing
LPC1768 processor
ARM Processor
internet
Hardware Implementation
Floods
DoS attacks
DoS
denial of service attack
Data Security
Cybersecurity
Computers
computer network security
Computer crime
biblio
Secure data exchange using authenticated Ciphertext-Policy Attributed-Based Encryption
Submitted by grigby1 on Mon, 02/27/2017 - 11:53am
data sharing
set theory
secure data exchange
public network
pubcrawl170107
private key cryptography
private key attribute set
military aircraft
file sharing
encryption
electronic data interchange
data sharing systems
Access Control
Data Security
data encryption
data authentication
CP-ABE
confidentiality feature
ciphertext-policy attribute-based encryption
authentication feature
authentication
asymmetric encryption mechanism
Ad hoc networks
biblio
"Privacy preserving of two sixteen-segmented image using visual cryptography"
Submitted by grigby1 on Thu, 02/23/2017 - 10:42am
privacy preservation
visualization
visual cryptography
unauthorized access
text analysis
statistical test
statistical analysis
sixteen-segmented text image
secret sharing
pubcrawl
16-segment display
information security
image segmentation
document image processing
Data Security
pubcrawl170105
data privacy
Cryptography
authorisation
Algorithm design and analysis
biblio
"Multiple embedding secret key image steganography using LSB substitution and Arnold Transform"
Submitted by grigby1 on Tue, 02/14/2017 - 12:13pm
pubcrawl170102
visualization
Transforms
Steganography
Spatial domain
security of data
secret key image steganography
secret image encryption
Public key
Arnold transform
LSB substitution
Image coding
Histograms
digital images
Digital Image Steganography
Data Security
Cryptography
covert channel
biblio
"VLSI implementation of BER measurement for wireless communication system"
Submitted by grigby1 on Tue, 02/14/2017 - 11:50am
forward error correction
wireless communication system
Wireless communication
VLSI implementation
VLSI
Very large scale integration
telecommunication control
symmetric encryption algorithm
Receivers
radio transmitters
radio receivers
pubcrawl170102
MIMO transmitter
MIMO receiver
MIMO communication
forward error correction codes
BER
FEC codes
fading channels
fading channel
error statistics
encryption
Data Transmission
Data Security
data reliability
CSEEC
cryptosystem with embedded error control
Cryptography
Crypto-System
Bit error rate
BER measurement communication system
biblio
"Enhanced Cryptcoding: Joint Security and Advanced Dual-Step Quasi-Cyclic LDPC Coding"
Submitted by grigby1 on Tue, 02/14/2017 - 11:45am
frame-error-rate
tablet
smartphone
SLCC
quasicyclic parity check matrix
pubcrawl170102
power-efficient design
Phase change materials
PCM
parity check codes
low density parity check coding
JSALE
JSALC method
joint security and advanced LDPC-based encryption
joint security and advanced dual-step quasicyclic LDPC coding
high throughput mobile device
advanced encryption system
FER
error statistics
encryption
encoding
dual-step secure LDPC code for channel coding
Data Security
cyclic codes
Cryptography
cryptcoding
Complexity theory
Cloud Computing
channel coding
battery-life
AES-128 security level
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:11pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
A support middleware solution for e-healthcare system security
Submitted by BrandonB on Wed, 05/06/2015 - 1:10pm
Logic gates
wireless sensor networks
system security
support middleware solution
security vulnerabilities
security of data
patient information security
patient information privacy
network security
middleware
Medical services
medical administrative data processing
masquerade attack
authentication
Internet security
information sharing
health care-specific security standards
health care organizations
health care
electronic health care
e-Healthcare
e-health care system security
Data Security
data privacy
data integrity
Communication system security
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »