Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
fog node
biblio
Privacy Preserving Data Aggregation in Fog Computing using Homomorphic Encryption: An Analysis
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
authenticity
privacy preserving data aggregation
mobility awareness
location related awareness
Io
homomorphic encryption algorithms
Cloud Securit
fog node
Homomorphic encryption
cloud environment
Fog computing
Human Factors
cloud services
Cloud Computing
False Data Injection
Metrics
privacy
pubcrawl
Resiliency
data integrity
IoT devices
Internet of Things
data privacy
Cryptography
Scalability
biblio
A Trust-based Real-time Map Updating Scheme
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
fog node
privacy
Policy-Governed Secure Collaboration
policy-based governance
message source vehicle
malicious vehicles
Internet of Vehicles
high-precision map service
Global Positioning System
pubcrawl
false trust
data privacy
blockchain
Bayesian inference model
automatic driving
anonymity
accurate traffic information
Scalability
trust
traffic information systems
timely traffic information
telecommunication traffic
Sybil attack prevention
Servers
security of data
Security analysis
trust value offset
Roads
road condition information
Resiliency
resilience
real-time systems
real-time map updating
Public key
biblio
Binarized Multi-Factor Cognitive Detection of Bio-Modality Spoofing in Fog Based Medical Cyber-Physical System
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
heavy-weight detection mechanisms
bio-modality detection sensors
bio-modality detection systems
bio-modality spoofing
Biomedical imaging
Feature Selection
fingerprint identification
fog based architectures
fog node
fog-based security application
binarized multifactor cognitive detection
image synthesis
Iris recognition
MCPS
resource-constrained sensors
secure user authentication
Sensor management
spoofing bio-identifiable property
spoofing detection
cyber-physical systems
telecommunication security
computer architecture
feature extraction
learning (artificial intelligence)
Resiliency
pubcrawl
wireless sensor networks
Metrics
authentication
security of data
sensors
biometrics (access control)
Human Factors
face recognition
Fog computing
Ensemble Learning
medical cyber-physical systems
multifactor authentication