Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
"Bit-Level Differential Power Analysis Attack on Implementations of Advanced Encryption Standard Software Running Inside a PIC18F2420 Microcontroller"
Submitted by grigby1 on Thu, 02/23/2017 - 11:52am
Mathematical model
side channel attacks
pubcrawl170105
Power measurement
Power demand
Power Attacks
PIC18F2420 microcontroller
microcontrollers
microcontroller security
microcontroller privacy
microcontroller
advanced encryption standard software
encryption
Differential Power Analysis
Data protection
data integrity
data confidentiality
Cryptography
cryptographic algorithms
bit-level differential power analysis attack
AES
biblio
"Using Honey Templates to Augment Hash Based Biometric Template Protection"
Submitted by grigby1 on Thu, 02/23/2017 - 11:30am
hash
Sugar
Servers
secure sketch
pubcrawl
privacy leakage concern
machine learning based protected template generation protocol
learning (artificial intelligence)
honeywords
honeyword
honey templates
honey template
hashed password cracking
hash based BTPS
hash based biometric template protection
authentication
fuzzy vault
fuzzy commitment
Databases
database leakage
Data protection
data privacy
Cryptography
cryptographic hash calculation
biometrics (access control)
biometric template verification
biometric template storage
pubcrawl170105
biometric template protection
biometric template database leakage detectability
biblio
"Dynamic Remote Attestation Based on Concerns"
Submitted by grigby1 on Thu, 02/23/2017 - 11:20am
privacy
trusted root
Trusted Computing
tree data structures
storage applications
static measure
software metrics
Software measurement
software integrity metrics
Software Architecture
security
request service software module
Remote Attestation
pubcrawl
privacy protection
Application software
operating systems
Monitoring
Merkel hash tree
load module
integrity measurement architecture
efficiency improvement
dynamic remote attestation
dynamic credible monitoring module
Data protection
concerns
computing environments
challenger relationship analysis
attestation relationship analysis
biblio
"Securing the Clustered Database Using Data Modification Technique"
Submitted by grigby1 on Thu, 02/23/2017 - 11:02am
Distributed databases
weka tool
standards
security of data
security
pubcrawl
Privacy preserving protocols
pattern clustering
online media
Iris
information protection
clustering
Distributed Database
distributed clustered database environments
database clustering
Data protection
pubcrawl170105
data privacy
data modification
Data mining
computer science
biblio
"An imperceptible watermarking technique for copyright content using discrete cosine transformation"
Submitted by grigby1 on Tue, 02/14/2017 - 11:55am
Government
Watermarking
pubcrawl170102
image watermarking
image retrieval
image protection scheme
image compression
Image coding
IDCT
government sector
government data processing
Computers
frequency-domain analysis
frequency domain
encryption
discrete cosine transforms
discrete cosine transformation
digital watermarking scheme
DCT
Data protection
copyright content
copyright
biblio
"Discarded hard disks ??? A treasure trove for cybercriminals: A case study of recovered sensitive data from a discarded hard disk"
Submitted by abfox on Tue, 02/14/2017 - 11:25am
security threats
malware
Media
Organizations
pubcrawl170101
reconnaissance activities
recovered sensitive data
Security and Privacy Awareness
security controls
malicious link
sensitive-personal organizational data
social network analysis
Software
Spear-phishing
stolen storage devices
Trust management
unsolicited e-mail
e-mail credibility
background information
Cybercrime
cybercriminals
Data protection
data recovery
Digital Forensics
discarded hard disks
discarded storage devices
advanced persistent threat
Electronic mail
hard discs
Hard disks
invasive software
malicious activities
malicious actors
malicious attachment
biblio
"Advanced Persistent Threats - detection and defense"
Submitted by abfox on Tue, 02/14/2017 - 11:11am
Data protection
software IDS tools
Servers
security upgrades
security policies
pubcrawl170101
Organizations
Monitoring
malware
encryption
Access Control
Data mining
Cryptography
computer systems
command and control systems
authorisation
Attack vectors
Anomaly Detection
advanced persistent threats
biblio
Protection against Web 2.0 Client-Side Web Attacks Using Information Flow Control
Submitted by BrandonB on Wed, 05/06/2015 - 1:03pm
Information Leakage
Web pages
Web 2.0 client-side Web attacks
Web 2.0
social networks
Servers
Semantics
security
secure browsing environment
protection systems
malicious script injection
legitimate Web sites
invasive software
internet
AJAX
Information Flow Control
IDS systems
firewalls
feature extraction
Data protection
cyber-criminals
cross-site scripting
cross-site request forgery
Computer crime
Client-side web attacks
Browsers
botnets
antivirus solutions
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 12:26pm
cloud transactions
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
service provider ability
service provider integrity
transacting parties
trust
Banking
Cloud Computing
cloud services acquisition
internet
Context
Data protection
digital identity management system
financial institutions
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Ghana
identity abuses
information privacy
interest protection
biblio
Explaining the Role of Trust in Cloud Service Acquisition
Submitted by BrandonB on Wed, 05/06/2015 - 12:26pm
cloud transactions
identity abuses
information privacy
interest protection
internet
Law
mediating
Organizations
personal identity information
privacy
sensitive personal information
Banking
Cloud Computing
cloud services acquisition
Ghana
Context
service provider ability
service provider integrity
transacting parties
trust
trusted cloud identity ecosystem
Trusted Computing
user assurances
user confidence
Data protection
digital identity management system
financial institutions
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »