Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile devices
biblio
An ID-Based User Authentication Scheme for Cloud Computing
Submitted by BrandonB on Tue, 05/05/2015 - 8:37am
anonymity
authentication
authorisation
authorization
Cloud Computing
cloud computing environments
Cryptography
ID-based scheme
ID-based user authentication scheme
Law
mobile devices
Nickel
Servers
user authentication
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 2:16pm
Mobile communication
wireless sensor networks
user privacy protection
sensors
security of data
privacy level
privacy
performance evaluation
participatory sensing
mobile phones
Mobile handsets
mobile devices
mobile computing
ban zones
map-based silent zones
location data
large-scale sensing systems
k-anonymity
habitat density
embedded sensors
dynamic map-based blinding out
data privacy
Cities and towns
cartography
Buildings
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 2:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
biblio
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
malware detection
transformation attacks
operating systems (computers)
obfuscation techniques
next-generation solutions
mobile malware threats
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile
malware transformation
android
malware authors
malware
invasive software
Humanoid robots
encryption
DroidChameleon
commercial mobile antimalware products
anti-malware
Androids
Android antimalware
biblio
Mobiflage: Deniable Storage Encryptionfor Mobile Devices
Submitted by BrandonB on Mon, 05/04/2015 - 1:10pm
Humanoid robots
storage encryption
Steganography
steganographic techniques
plausibly deniable encryption
PDE
Mobile Platform Security
Mobile handsets
mobile environment
mobile devices
mobile computing
Mobile communication
Mobiflage
MF-SD
MF-MTP variant
Law
Android (operating system)
File system security
FAT32 removable SD cards
Ext4 file system mechanisms
encryption
desktop OS
desktop environment
deniable storage encryption
deniable encryption
decryption keys
data-block allocator
data confidentiality
Cryptography
Androids
Android OS
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Android encryption systems
Submitted by BrandonB on Mon, 05/04/2015 - 1:06pm
Humanoid robots
tablets
smart phones
security-critical environments
security-critical context
security-critical application scenarios
security features
RIM
platform-selection process
nonconsumer area
mobile devices
mobile device sector
Microsoft
ios
Android (operating system)
Google
encryption
device backups
Data protection
Cryptography
consumer-oriented devices
Blackerry
attack susceptibility
Apple
Androids
Android platform deployment analysis
Android encryption systems
biblio
Human acoustic fingerprints: A novel biometric modality for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 11:31am
mobile devices
unsupervised learning approach
transient evoked otoacoustic emission
Training
Time-frequency Analysis
security
pre-enrolled identity gallery
otoacoustic emissions
Otoacoustic Emission
Neural networks
neural nets
Mobile Security
Mobile handsets
mobile environment
Acoustic signal processing
mobile computing
Mobile communication
mobile biometric system
learning model
learning (artificial intelligence)
human acoustic fingerprints
generic dataset
feature extraction
blind recognition problem
biometrics (access control)
Biometric Verification
biometric modality
Autoencoder Neural Network
biblio
Cloud-based mobile IPTV terminal for video surveillance
Submitted by BrandonB on Fri, 05/01/2015 - 9:30am
Cameras
Cloud Computing
cloud-based mobile IPTV terminal
Internet protocol television
IPTV
Mobile communication
mobile devices
mobile television
mobile terminal
Servers
Streaming media
surveillance operators
surveillance video streams monitoring
video surveillance
video surveillance facilities distribution
biblio
Data security protocol for cloudlet based architecture
Submitted by BrandonB on Thu, 04/30/2015 - 2:20pm
encryption
unauthorized user
security
resource-rich computer
mobile devices
mobile computing
Mobile communication
mobile cloud computing technology
mobile cloud computing
internet
Cloud Computing
distributed cloud architecture
data security protocol
Cryptographic Protocols
Computers
computer architecture
cloudlet based architecture
cloudlet
cloud storage
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »