Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy
biblio
Staffing for Security: Don't Optimize
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
botnets
computer security
Data Security
Economics
IT security employees
Organizations
Personnel
privacy
security
security of data
security threats
software development
staff allocation optimization
staffing
biblio
Secure multi-party computation protocol using asymmetric encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:50am
packetization
TTP
trusted third party (TTP)
trusted third party
security
Secure Multi-Party Computation (SMC)
public-key encryption
public key cryptography
Public key
Protocols
protocol design
private key cryptography
private key
privacy preservation
privacy
anonymity
message encryption
medical science
Joints
individual privacy
financial analysis
encryption
decryption key
data privacy
Cryptographic Protocols
confidentiality
asymmetric secure multiparty computation protocol
asymmetric encryption scheme
Asymmetric Encryption
anonymization
biblio
Preserving the Anonymity in MobilityFirst networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:55am
mobile computing
user anonymity
Trusted Computing
trust issues
three-tiered approach
telecommunication security
telecommunication network routing
Routing protocols
Routing
routers
Public key
privacy preservation
privacy
MobilityFirst networks
AMF
MF networks
internet
GUID
GNRS
globally unique flat identifier
global name resolution service
future Internet architecture
data privacy
computer science
authorisation
anonymity preservation
anonymity in MobilityFirst
biblio
Security with privacy - A research agenda
Submitted by BrandonB on Tue, 05/05/2015 - 9:35am
PE applications
social media
security of data
security
Research Agenda
privacy-preserving data management
privacy-preserving data analysis
privacy-enhancing techniques
privacy
PII
personally identifiable information
PE techniques
Big Data
outsourced data
Media
encryption
Electronic mail
data sources
data privacy
cloud environment
Cloud Computing
Cancer
business intelligence
big data analysis
biblio
Information Security in Big Data: Privacy and Data Mining
Submitted by BrandonB on Tue, 05/05/2015 - 9:34am
decision maker
tracking
sensitive information
security of data
Provenance
privacypreserving data mining
privacy-preserving data mining
privacy preserving data mining
privacy auction
privacy
PPDM
information security
information protection
game theory
Algorithm design and analysis
data publishing
data provider
Data protection
data privacy
Data mining
data miner
data collector
data acquisition
computer security
Big Data
anti-tracking
anonymization
biblio
Privacy and Big Data
Submitted by BrandonB on Tue, 05/05/2015 - 9:29am
anonymization
Big Data
data analysis
Data collection
Data integration
data privacy
data retention
de-identification
Government
privacy
Public policy
security
biblio
Policy Design Based on Risk at Big Data Era: Case Study of Privacy Invasion in South Korea
Submitted by BrandonB on Tue, 05/05/2015 - 9:24am
risk avoidance
impact level
individual ICT risk
individualism group
intensive ICT risk
Moon
personal data
privacy
privacy invasion
probability level
risk acceptance
ICT security
risk management
risk mitigation
risk transfer
security
severe ICT risk
social science perspective
South Korea
strong ICT risk
technological risk
data spill accident case analysis
Big Data
Big Data characteristics
Big Data laws
Big Data market
Big Data norms
Big Data technology
cultural types
culture type
data privacy
Accidents
data variety
data velocity
data volume
egalitarianism group
fatalism group
hierarchy group
ICT policy
ICT risk based policy design
ICT risk management
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 2:16pm
Mobile communication
wireless sensor networks
user privacy protection
sensors
security of data
privacy level
privacy
performance evaluation
participatory sensing
mobile phones
Mobile handsets
mobile devices
mobile computing
ban zones
map-based silent zones
location data
large-scale sensing systems
k-anonymity
habitat density
embedded sensors
dynamic map-based blinding out
data privacy
Cities and towns
cartography
Buildings
biblio
An anonymous payment system to protect the privacy of electric vehicles
Submitted by BrandonB on Mon, 05/04/2015 - 2:15pm
Energy Provider Company
vehicles
Trusted Platform Module
Trusted Computing
tpm
Servers
secondary cells
Registers
recharging service
recharging infrastructure
Protocols
privacy protection
privacy
financial management
EPC
anonymous credential technique
electrical energy
Electric Vehicles
driver privacy
driver information systems
double spending detection
data privacy
Cryptography
battery powered vehicles
battery
batteries
automobile
authentication
anonymous payment system
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
« first
‹ previous
…
237
238
239
240
241
242
243
244
245
…
next ›
last »