Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data protection
biblio
An efficient KP-ABE scheme for content protection in Information-Centric Networking
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
KP-ABE
fast key generation
FKP-ABE
ICN
indeterminate caches
information-centric networking
internet
Internet traffic
key policy attribute based encryption
fast key decryption
KP-ABE schemes
policy-based governance
pubcrawl
Scalability
self-contained protection
Streaming media
telecommunication traffic
Access Control
fast decryption
encryption
efficient KP-ABE scheme
efficient key-policy ABE
Data Security
Data protection
Cryptography
content protection
computer network security
computer architecture
collaboration
cached contents
cache storage
attribute-based encryption
attribute based encryption
biblio
Protect white-box AES to resist table composition attacks
Submitted by aekwall on Mon, 07/20/2020 - 9:54am
cryptographic software protection
white box cryptography
white-box cryptography
white-box attack context
white-box AES protection
WBAC
Time complexity
table-composition-targeting white-box attacks
table-composition-targeting cryptanalysis techniques
key-embedding lookup tables
key recovery attacks
De Mulder et al.'s attack
Resiliency
Billet et al.'s attack
affine mappings
Table lookup
Secret key
computational complexity
public key cryptography
Data protection
Metrics
composability
pubcrawl
biblio
NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
recommender system
user privacy in the cloud
user privacy data
user personal information security
recommendation system
recommendation process
privacy protection algorithm
NMF-based privacy-preserving collaborative filtering
nmf
matrix elements
information science
recommender systems
Matrix decomposition
Privacy-preserving
security of data
Scalability
data privacy
collaboration
Data protection
Hybrid algorithm
Metrics
privacy
collaborative filtering
pubcrawl
Resiliency
Servers
Cloud Computing
biblio
Privacy Token Technique for Protecting User’s Attributes in a Federated Identity Management System for the Cloud Environment
Submitted by aekwall on Mon, 07/13/2020 - 10:06am
cloud environment
user privacy in the cloud
user attributes protection
SPs
Services and user’s privacy
pseudonymous technique
pseudoattributes values
privacy token technique
Privacy Token
personal identifiable information
Java programming language
federated identity management system
CloudAnalyst simulation
attributes privacy protection
Cloud Computing
privacy risks
Scalability
cloud
Java
service providers
risk management
Data protection
Metrics
privacy
pubcrawl
Resiliency
authorisation
biblio
A Lightweight Blockchain-Based Privacy Protection for Smart Surveillance at the Edge
Submitted by grigby1 on Fri, 07/03/2020 - 4:05pm
smart surveillance
privacy
privacy protection
pubcrawl
real-time video analytics
resilience
Resiliency
Scalability
secure privacy-preserving solution
policy-based enforcement
surveillance cameras
Transforms
video access sanctioning
video signal processing
video surveillance
video surveillance system security
VSS security
edge devices
blockchain technologies
Cryptography
data privacy
Data protection
Deterrence
Distributed databases
edge detection
edge device
blockchain security
federated blockchain network
Human behavior
Internet of Things
Lib-Pri system transforms
lightweight blockchain
lightweight privacy-preserving solution
Off-Site Storage
biblio
A Dual Layer Image Encryption using Polymerase Chain Reaction Amplification and DNA Encryption
Submitted by aekwall on Mon, 06/22/2020 - 10:27am
encoding
unauthorized data access
polymers
polymerase chain reaction amplification
image protection
dual layer image encryption
DNA encryption
digital image security
biological sequences
binary encoding
biocomputing
DNA cryptography
cryptographic algorithms
image encryption
authorisation
Predictive Metrics
digital images
DNA
privacy
Image coding
Data protection
pubcrawl
Human behavior
Resiliency
encryption
Data Security
Cryptography
biblio
Impact Evaluation of Embedded Security Mechanisms on System Performance
Submitted by aekwall on Mon, 06/15/2020 - 9:55am
data flows
system protection
subject-object model
reference monitor functional model
reference monitor
impact evaluation analytical model of reference monitor
impact evaluation
general-purpose systems
embedded security mechanisms
System performance
system security
Hardware Security
security of data
Mathematical model
Analytical models
Data protection
Metrics
composability
pubcrawl
Resiliency
embedded systems
performance evaluation
Access Control
Monitoring
biblio
A Game Theoretic Approach for Dynamic Information Flow Tracking with Conditional Branching
Submitted by aekwall on Mon, 06/08/2020 - 10:55am
Stochastic processes
linear optimization problem
Predictive Metrics
Human Factors
system security
Games
process control
computational complexity
probability
stochastic games
Analytical models
Data protection
reachability analysis
data flow analysis
pubcrawl
security
Scalability
security of data
conditional-branch tracking
polynomial-time algorithm
NetRecon attack
Linear programming
infinite-horizon undiscounted stochastic games
infinite-horizon stochastic game
DIFT
data-flow handling
control-flow commands
reachability probability
conditional branching
APT
advanced persistent threats
nonlinear programming
game theoretic security
Dynamic Information Flow Tracking
game theoretic approach
Nash Equilibrium
biblio
Test methodology for detecting short-channel faults in network on- chip networks using IOT
Submitted by grigby1 on Fri, 05/15/2020 - 11:44am
integrated circuit reliability
short-channel fault detection
Routing
routers networks
Power demand
NoC
network-on-chip analysis machine
network-on-chip
network routing
network on- chip networks
network on chip
Monitoring
IoT
Internet of Things
interconnection networks
integrated circuit testing
network on chip security
Integrated circuit interconnections
fault diagnosis
Encoders/decoders
Data Security
Data protection
data encryption
Cryptography
Conferences
computing-intensive data processing
computer architecture
Aerospace electronics
Metrics
Resiliency
resilience
Scalability
biblio
Optimized Data de-Identification Using Multidimensional k-Anonymity
Submitted by aekwall on Mon, 04/20/2020 - 9:24am
data quality
privacy models and measurement
privacy protection mechanism
privacy preserving
privacy leak risk
priority weight-adjusted method
personal privacy
personal information
optimized multidimensional method
multidimensional k-anonymity
mean difference recommending tree method
MDR tree method
k-anonymity
information loss rate
globalized knowledge economy
de-identification
Big Data
data authenticity preservation
big data analysis
anonymization-based de-identification method
information loss
greedy algorithms
Big Data Analytics
Numerical models
data privacy
Measurement
data analysis
Data protection
Metrics
privacy
pubcrawl
Data models
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »