Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
Investigating the Value of Privacy within the Internet of Things
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Mobile communication
user privacy protection
Scalability
Resiliency
resilience
pubcrawl
PrivacyGate
privacy
phones
personal information
personal data exchange
operating systems
mobile computing
Android (operating system)
IoT transaction privacy
IoT devices
Internet of Things
human factor
Human behavior
game-theoretic concept
game theory
Data protection
data privacy
Computing Theory
Companies
Android operating system
biblio
Towards a theory of free-lunch privacy in cyber-physical systems
Submitted by grigby1 on Wed, 09/05/2018 - 10:39am
Human behavior
Smart homes
Scalability
Resiliency
resilience
Public transportation
pubcrawl
privacy
optimization
multiparametric programming
mathematical programming
human factor
computational geometry
Heating systems
free-lunch privacy mechanism
Decision Making
data-informed decision making processes
data utility
Data protection
data privacy protection
data privacy
cyber-physical systems
Computing Theory
biblio
Group Differential Privacy-Preserving Disclosure of Multi-level Association Graphs
Submitted by grigby1 on Wed, 09/05/2018 - 10:38am
group differential privacy-preserving disclosure
εg-group differential privacy
Scalability
Resiliency
resilience
pubcrawl
privacy
multilevel association graphs
information privacy protection
human factor
Human behavior
group privacy
aggregate information
graph theory
graph data
Electronic mail
drugs
Data protection
data privacy
data analysis
Computing Theory
Bipartite graph
Aggregates
biblio
Group signature based privacy protection algorithm for mobile ad hoc network
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
mobile computing
vehicular ad hoc networks
vehicular ad hoc network
Time delay
signature length
short group signature
Resiliency
resilience
pubcrawl
privacy protection issues
privacy protection
privacy
Packet loss rate
network model
anonymous verification
mobile ad hoc network
Metrics
message verification
MANET
group signature based privacy protection algorithm
digital signatures
Data protection
Compositionality
BBS algorithm
Batch verification
automobiles
authentication
biblio
Adaptive models for security and data protection in IoT with Cloud technologies
Submitted by grigby1 on Mon, 06/11/2018 - 3:48pm
Metrics
virtualised sensor nodes
virtual reflection
sensors
sensor-cloud security
sensor-cloud architecture
security
secure association
Resiliency
resilience
Reliability
pubcrawl
Protocols
privacy
multilayer client-server model
Microelectronics Security
adaptive models
IoT
Internet of Things
Hardware
gateways
data storage
Data protection
data privacy
data integrity
computer architecture
composability
cloud technologies
Cloud Computing
authorization
authentication
application servers
biblio
Accountable Internet of Things? Outline of the IoT databox model
Submitted by grigby1 on Mon, 06/11/2018 - 3:40pm
IoT databox model
US
trust
social arrangements
Resiliency
resilience
pubcrawl
process control
network accountability
Metrics
legislation
accountability
IoT Databox
Internet of Things (IoT)
Internet of Things
Europe
data protection legislation
Data protection
Data processing
Computational modeling
composability
biblio
A security-aware routing implementation for dynamic data protection in zone-based MPSoC
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
multiprocessing systems
network on chip security
Zones
security-aware routing
network-on-chip routing
network routing
multiprocessor system-on-chip
MPSoC
Encapsulation
asymmetrical security zones
Firewalls (computing)
Runtime
NoC
Routing protocols
Metrics
resilience
Routing
IP networks
Data protection
network-on-chip
Scalability
Resiliency
pubcrawl
security
biblio
PUFSec: Protecting physical unclonable functions using hardware isolation-based system security techniques
Submitted by grigby1 on Mon, 06/11/2018 - 3:20pm
physical unclonable function protection
Xilinx SoC
system-on-chip
system security techniques
Software
security protection
security policies
security compromises
security challenges
secure architecture extension
Resiliency
resilience
PUFSec framework
PUF workflow
PUF hardware
pubcrawl
Access Control
Networked Control Systems Security
Monitoring
Modeling Attacks
Metrics
internal PUF design
hardware isolation
Hardware
DoS attacks
Denial of Service attacks
Data protection
control systems
computer network security
computer architecture
composability
ARM Processor
biblio
An object-oriented open software architecture for security applications
Submitted by grigby1 on Thu, 06/07/2018 - 3:01pm
public key cryptography
Universal Serial Bus
Software Architecture
Software
smart cards
security of data
security device
security applications
security APIs
security
secure messaging
secure communication
SEcube™ platform
Resiliency
resilience
application program interfaces
pubcrawl
Pins
Open Hardware security platform
object-oriented open software architecture
object oriented security
multiplatform Open Source security framework
Metrics
Libraries
Hardware
field programmable gate arrays
dedicated Open Hardware devices
Data protection
CPU
composability
biblio
Protect Sensitive Information against Channel State Information Based Attacks
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
sensitive on-screen gestures
pubcrawl
public WiFi environments
Receivers
resilience
Resiliency
Scalability
security attacks
sensitive information protection
privacy protection
text-based passwords
Transmitters
WiFi channel interference
WiGuard
Wireless communication
Wireless fidelity
wireless LAN
authorisation
privacy
Portable computers
pattern locks
mobile devices
locking patterns
Interference
Human behavior
gesture recognition
finger motions
Data protection
CSI-based attacks
CSI-based attack
computer network security
channel state information based attacks
channel interference
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »