Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
privacy properties
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by grigby1 on Fri, 10/16/2020 - 10:14am
nonrepudiation properties
trusted security solution
Trusted Computing
trust of government
trust
security threats
security requirements
security perspective
Resiliency
resilience
pubcrawl
Privacy Requirements
privacy relationships
privacy properties
privacy
policy-based governance
Access Control
message authentication
internet
inclusive security model
inclusive security
Human behavior
government data processing
e-government trust
E-Government
e-gov
data privacy
Cybersecurity
collaboration
authorization
authorisation
authentication
biblio
Rethinking Location Privacy for Unknown Mobility Behaviors
Submitted by aekwall on Mon, 09/28/2020 - 11:02am
blank-slate models
Computing Theory and Privacy
Zirconium
unknown mobility
sporadic hardwired models
Quantifying privacy
profile estimation-based LPPM
privacy properties
nonsporadic location privacy scenarios
mobility patterns
Mobility Models
mechanism design
LPPM design
location privacy-preserving mechanisms
location privacy service
location privacy protections
Scalability
blank-slate approach
design phase
location privacy
Training data
data privacy
testing
Training
Data protection
privacy
pubcrawl
Human behavior
Resiliency
Data models
mobile computing
biblio
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways
Submitted by grigby1 on Thu, 01/31/2019 - 11:21am
road safety
private information
Protocols
pseudonym-varying scheduling
pubcrawl
real-time systems
Receivers
resilience
Resiliency
privacy properties
Scalability
secure authentication algorithm
Security Properties
spatial-temporal messages
Spatial-Temporal Trust mechanism
Symmetric-Key Cryptography
Trusted Computing
anonymous messaging
privacy
message authentication
malicious cars
Intelligent Transportation Systems
Intelligent Transportation System
FastTrust
Fast and Anonymous Spatial-Temporal Trust
Expressways
entropy-based commitment
data privacy
Cryptography
connected cars
automobiles
authorisation
authentication
biblio
A review on VANET security attacks and their countermeasure
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Resiliency
world VANET
Wireless communication
vehicular ad hoc networks
VANETs wireless communication
VANETs architecture
VANETs
VANET technology
VANET security attacks
V2Vcommunication
telecommunication security
smart cities
security issues
security
Roads
attacks
resilience
pubcrawl
privacy properties
privacy
mobile computing
Metrics
MANETs
MANET
infrastructure communication
ECDSA
DSRC
Cryptography
Compositionality
authentication
biblio
Formalizing Anonymous Blacklisting Systems
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
mail servers
trust assumptions
service providers
service provider
Resistance
Relays
real-world adoption
Protocols
privacy-enhanced revocation
privacy properties
privacy enhancing technologies
privacy
abusive anonymous users
IRC networks
internet
formalizing anonymous blacklisting systems
computer network security
authentication
anonymous revocation systems
anonymous communications networks
anonymous blacklisting systems
anonymous blacklisting
anonymity