Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Enhancing security in cyber-physical systems through cryptographic and steganographic techniques
Submitted by BrandonB on Wed, 05/06/2015 - 2:08pm
information technology
Steganography
steganographic technique
security enhancement
Receivers
Public key
Pragmatics
physical elements
multi-agent systems
authorisation
hierarchical access
encryption
Data Security
data confidentiality
cyber-physical systems
Cryptography
cryptographic technique
computational elements
biblio
Key Management for Cloud Data Storage: Methods and Comparisons
Submitted by BrandonB on Wed, 05/06/2015 - 1:40pm
Memory
symmetric key cryptography algorithms
symmetric key
storage management
Servers
sensitive information protection
Public key
public cloud
potential intruders
outsourced cloud
Organizations
onsite cloud
applications
key management
encryption key management
decryption key management
Data Security
Cryptography
Communities
cloud service provider
cloud scenarios
cloud data storage
cloud computing paradigm
Cloud Computing
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Wed, 05/06/2015 - 11:07am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
Staffing for Security: Don't Optimize
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
botnets
computer security
Data Security
Economics
IT security employees
Organizations
Personnel
privacy
security
security of data
security threats
software development
staff allocation optimization
staffing
biblio
COALA - System for Visual Representation of Cryptography Algorithms
Submitted by BrandonB on Tue, 05/05/2015 - 11:44am
RSA algorithm
Diffie-Hellman
Diffie-Hellman algorithm
educational courses
Educational institutions
educational software systems
engineering sciences
further education
RSA
DES algorithm
School of Electrical Engineering
security education
Software algorithms
student attitudes
student knowledge acquisition
University of Belgrade
visualization
AES
DES
Data visualization
data visualisation
data security course
Data Security
cryptography algorithms
Cryptography
cryptographic algorithms
cryptographic algorithm visual representation
computer science education
computer aided instruction
COALA system
algorithm visualization
Algorithm design and analysis
AES algorithm
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
Load balancing for privacy-preserving access to big data in cloud
Submitted by BrandonB on Tue, 05/05/2015 - 9:23am
random data placement algorithm
geo-distributed cloud site
information retrieval
load balanced storage system
low-complexity algorithm
NP-hardness
ORAM algorithm
privacy preserving access
Random access memory
file servers
random processes
resource allocation
responsiveness
security
Servers
storage management
storage server
data placement problem
Cloud Computing
cloud storage
computational complexity
Conferences
data availability
data content protection
data maintenance cost reduction
data management
Big Data
data privacy
Data protection
Data Security
Distributed databases
distributed file system
encryption
file server
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 9:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
biblio
MTBAC: A mutual trust based access control model in Cloud computing
Submitted by BrandonB on Fri, 05/01/2015 - 8:36am
mutual trust mechanism
web services
virtualized Web services
virtualisation
user behavior trust
trust model
Trust management
Time-frequency Analysis
scalable Web services
Reliability
open conditions
mutual trust relationship
Access Control
mutual trust based access control model
MTBAC model
MTBAC
Data Security
Computational modeling
cloud service node credibility
cloud computing security
cloud computing environment
Cloud Computing
authorisation
« first
‹ previous
…
18
19
20
21
22
23
24
25
26
next ›
last »