Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
efficiency
biblio
Design and Development of a Smart Surveillance System for Security of an Institution
Submitted by grigby1 on Tue, 05/10/2022 - 3:31pm
pubcrawl
video surveillance
surveillance
smart surveillance
security breaches
security
Safety
Resiliency
resilience
efficiency
Power demand
Metrics
machine learning algorithms
machine learning
Internet of Things (IoT)
Human behavior
fire detection
face recognition
biblio
Trusted Anonymous Authentication For Vehicular Cyber-Physical Systems
Submitted by grigby1 on Thu, 05/13/2021 - 12:07pm
Cloud Computing
security
pubcrawl
resilience
Resiliency
authentication
privacy
Databases
Forensics
Cameras
anonymous messaging
Internet-of-Things
efficiency
Trusted Anonymous Authentication
Vehicular Cyber-Physical Systems
biblio
Improving Authentication and Data Sharing Capabilities of Cloud using a Fusion of Kerberos and TTL-based Group Sharing
Submitted by grigby1 on Tue, 04/27/2021 - 12:24pm
Kerberos
Cryptography
Resiliency
Metrics
Human behavior
Authentication attack detection
cloud
composability
data sharing
efficiency
pubcrawl
resilience
Secure File Sharing
biblio
Transparent IFC Enforcement: Possibility and (In)Efficiency Results
Submitted by grigby1 on Thu, 03/04/2021 - 2:34pm
security lattice
programming languages
pubcrawl
real-world programs
resilience
Resiliency
Runtime
secure information flow control
Secure Multi-Execution
secure programs
security condition
polynomial time
security of data
Semantics
SME family
termination insensitive noninterference
third-party systems
transparency
transparent enforcement
transparent IFC enforcement
white-box
FlowFox browser
white box
security
black-box
black-box enforcement
Browsers
composability
computational complexity
Computer languages
efficiency
faceted secure multiexecution
White Box Security
FSME
IFC community
Information Flow Control
Lattices
memory overhead
Metrics
Multiple Facets
no-write-down no-read-up style security policy
noninterference
biblio
Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis
Submitted by aekwall on Mon, 11/23/2020 - 11:21am
Intelligent Data Security
verifiability
storage management
Servers
security
Scalability
Resiliency
remote servers
pubcrawl
privacy-preserving keyword search schemes
privacy issue
privacy
keyword search functions
Keyword search
Big Data
Intelligent Data and Security
Information Leakage
Indexes
encryption
encrypted cloud data
efficiency
data privacy
Cryptography
Compositionality
cloud storage services
cloud storage
Cloud Computing
biblio
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
malicious individuals
localization
indoor radio
Android app
Buildings
Columbia University dormitory
Fingerprinting
GPS signals
homo-morphic cryptographic schemes
Indoor environments
Metrics
server computation capabilities
server-side fingerprint-based indoor localization
socialist millionaire problem
unique encrypted sorting capability
Wi-Fi
Wi-Fi access points
wireless signals
android encryption
pubcrawl
Servers
Cryptography
encryption
data privacy
telecommunication security
Protocols
mobile computing
Resiliency
Human behavior
Scalability
privacy
Databases
smart phones
wireless LAN
Wireless fidelity
Homomorphic encryption
efficiency
fingerprint identification
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
efficiency
privacy models and measurement
server security
Location-based social applications
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
query processing
security of data
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Preserving Location Privacy in Geosocial Applications using Error Based Transformation
Submitted by aekwall on Mon, 04/20/2020 - 10:23am
query processing
privacy models and measurement
server security
Location-based social applications
location transformation
location transformation
inverse transformation
geographic information
geo-social applications
error based transformation approach
ERB privacy mechanism guarantee
distance-preserving coordinate transformations
mobile device
security of data
efficiency
privacy protection
Indexes
Metrics
privacy
location privacy
pubcrawl
mobile computing
security
data privacy
encryption
Servers
biblio
Efficient Group Data Sharing In Cloud Environment Using Honey Encryption
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
group data sharing
Secure File Sharing
resilience
Resiliency
pubcrawl
standards
security
resource sharing
information sharing
honey encryption
Group Manager
Ciphers
efficiency
cloud environment
advanced encryption standard
cloud
resource allocation
Servers
Cloud Computing
encryption
Cryptography
biblio
Secure Equality Testing Protocols in the Two-Party Setting
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
composability
Cyber Physical System
cyber physical systems
efficiency
efficient encryption
equality test
Homomorphic encryption
privacy
Processing encrypted data
pubcrawl
resilience
Resiliency
1
2
3
next ›
last »