Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Security
biblio
Earprint: Transient Evoked Otoacoustic Emission for Biometrics
Submitted by BrandonB on Fri, 05/01/2015 - 8:14am
replay attacks
financial transaction
human auditory system
information fusion
learning (artificial intelligence)
Linear discriminant analysis
machine learning technique linear discriminant analysis
nonstationary signal time-frequency representation
otoacoustic emissions
feature extraction
Robust Biometric Modality
sensor fusion
signal representation
TEOAE
Time-frequency Analysis
transient evoked otoacoustic emission
wavelet analysis
Access Control
falsification attacks
earprint
Data Security
data privacy
cochlea
click stimulus
biometrics (access control)
biometrics
biometric fusion
authorisation
Auditory system
advanced spoofing techniques
advance forgery methods
advanced forgery techniques
acoustic response
biblio
Cyber security evaluation of synchrophasors in a power system
Submitted by BrandonB on Fri, 05/01/2015 - 7:32am
Phasor measurement units
synchrophasors
Smart Grids
Smart Grid
security of data
security
Real-time monitoring
power system security
power system
Power measurement
power grids
Power Grid
PMU
benchmark IEEE 68 bus power system model
phasor measurement
network infrastructure
line current
frequency measurements
Frequency measurement
Data Security
cyber-attacks
cyber security vulnerabilities
Current measurement
Communication Network
bus voltage
biblio
Towards robust, scalable and secure network storage in Cloud Computing
Submitted by BrandonB on Thu, 04/30/2015 - 2:38pm
security of data
networking
on-demand access
operating system
pay per use model
privacy
proactive security
RAID
remote application access
remote service access
robust scalable secure network storage
network storage architecture
server
Servers
service availability
service outsourcing
storage management
ubiquitous computing
ubiquitous next generation information technology architecture
virtualisation
Virtualization
data integrity
authentication
Availability
built in security
client overhead
Cloud Computing
cloud computing environment
cloud service provider
Compliance
computer architecture
confidentiality
adaptive security
data privacy
Data Security
data sharing
data storage
Distributed databases
information centric security
integrity
internet
middleware
biblio
A New Efficient and Secure POR Scheme Based on Network Coding
Submitted by BrandonB on Thu, 04/30/2015 - 2:35pm
dispersal code
Silicon
Servers
security of data
secure POR scheme
proof of retrievability
network coding-based POR
network coding
maintenance engineering
maintenance
local data storage
encoding
efficient POR scheme
Availability
Decoding
Data Security
data integrity
data confidentiality
data communication
data checking
data availability
cost reduction
corruption attack prevention
corruption attack
Cloud Computing
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Thu, 04/30/2015 - 2:34pm
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
Bootstrapping Trust in Commodity Computers
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Humans
Web server
Trusted Platform Module
Trusted Computing
trust
tpm
Secure Boot
privacy
information security
Banking
Hardware
Data Security
computer security
Code Identity
Central Processing Unit
Cellular phones
Bootstrap
biblio
State of the Art: Automated Black-Box Web Application Vulnerability Testing
Submitted by rvmeush on Fri, 09/26/2014 - 1:04pm
Automatic testing
Code standards
Computer hacking
Credit cards
Cross Site Scripting
Data Security
Decision support systems
Forgery
Personnel
privacy
Probes
SQL injection
SQLI
XSS
file
Privacy-preserving Search and Computation for Cloud Data
Submitted by Katie Dey on Thu, 11/01/2012 - 10:07pm. Contributor:
Kui Ren
ABSTRACT
SaTC Posters
Cloud Computing
Computation
Data Security
privacy
State University of New York at Buffalo
1262277
SaTC PI Meeting 2012
Academia
Poster
« first
‹ previous
…
18
19
20
21
22
23
24
25
26