Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless LAN
biblio
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
privacy
wireless LAN
Web servers
wearables security
wearables
wearable computers
smart phones
security
secure Internet communication
secure communication protocols
Scalability
Resiliency
resilience
pubcrawl
Protocols
available wearable computing devices
network measurements
Internet servers
internet
Human behavior
energy consumption
direct secure communication
direct Internet connection
direct Internet communication
direct communication
Cryptography
computer network security
Ciphers
Bluetooth
biblio
Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location
Submitted by grigby1 on Mon, 03/19/2018 - 1:37pm
Intrusion Detection
wireless LAN
Wi-Fi
Web sites
web browsing behavior
Web browsing
stylometry
Software Architecture
pubcrawl
parallel binary decision fusion architecture
online front-ends
multimodal biometric systems
Mobile handsets
Metrics
message authentication
Keyboards
Active Authentication
insider threat
Humanoid robots
Human behavior
GPS location
Global Positioning System
geographical colocation
decision fusion
biometrics (access control)
Behavioral biometrics
authentication
application usage patterns
Androids
Android mobile device
Android (operating system)
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
Time-Based One-Time Password for Wi-Fi Authentication and Security
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
pubcrawl
wireless networks
wireless LAN
Wireless fidelity
WiFi Security
Wi-Fi network security
Time-based One-Time Password (TOTP)
time-based one-time password
SSID
Service Set Identifier (SSID)
security infrastructure
Resiliency
resilience
authentication
Protocols
periodic secure passwords
Metrics
Internet of Things (IoT)
internet
encryption
Dictionaries
computer network security
composability
completely automated Wi-Fi authentication system
black box encryption
authorisation
biblio
A comparison of migration and multihoming support in IPv6 and XIA
Submitted by K_Hooper on Wed, 02/28/2018 - 11:38am
quality of service
Mobility
mobility anchor point
mobility management (mobile radio)
multihomed hosts
multihoming
optimization
protocol messages
Protocols
pubcrawl
mobile radio
Resiliency
resource allocation
Routing
Routing protocols
telecommunication network routing
telecommunication security
wireless LAN
XIA
XIA Migration Protocol
IP networks
client mobility
collaboration
composability
computer network management
fault tolerance
flow migration support
flow-level migration
heavy-weight protocol
internet
allocative efficiency
IPv6 address
IPv6 multihoming solutions
ipv6 security
Metrics
Mobile communication
mobile computing
Mobile IPv6
Mobile IPv6 Enhanced Route Optimization
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
A Graph-Theoretic Approach to Virtual Access Point Correlation
Submitted by grigby1 on Tue, 02/06/2018 - 2:04pm
Correlation
security standpoint
standardization process
telecommunication network management
Resiliency
secure network
security
VAP identification algorithm
virtual access point correlation
wireless LAN
wireless networks
802.11 access point implementation
Communication system security
computer network security
pubcrawl
functional improvement
graph theory
graph-theoretic approach
IEEE 802.11 Standard
individual provider
insecure network
logically separate networks
nascent wireless functionality management
Network reconnaissance
network topology
physical equipment
Probes
biblio
FlexiWi-Fi Security Manager Using Freescale Embedded System
Submitted by grigby1 on Mon, 03/13/2017 - 12:23pm
network security
wireless LAN
Wireless communication
user traffic
unauthorized user
Trusted Computing
trusted client
telecommunication traffic
telecommunication security
telecommunication network routing
telecommunication network management
system administrator
security
router
pre-shared key
personal model implementation
802.11 standard
infrared module
IEEE 802.11 Standard
freescale embedded system
FlexiWi-Fi security manager
enterprise model
encryption key
embedded systems
Cryptography
Communication system security
client radio
bluetooth module
Bluetooth
authorisation
802.1X
biblio
Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
Public key
IP networks
low-level software
mobile ad hoc networks
mobile computing
mobile devices
mobile-to-mobile communication
Networking Protocol
packet radio networks
Priority Mechanism
Interpersonal Communication
Receivers
rendezvous points
RP
social network
Social network services
telecommunication network routing
ubiquitous interpersonal communication
Wireless communication
wireless LAN
delay tolerant networks
ad-hoc 802.11 networks
Ad-Hoc Network
authentication
Bluetooth
cognitive radio
Cryptography
decentralized model
decentralized network routing
delay tolerant networking
Ad hoc networks
Delay-Tolerant Network
DHT
distributed hash tables
DTN
encryption
flexible trust network
hop-limited broadcast
Infrastructureless Communication
internet
biblio
VirtueMAN: A software-defined network architecture for WiFi-based metropolitan applications
Submitted by BrandonB on Tue, 05/05/2015 - 10:22am
QoS
wireless LAN
wireless access point
WiFi-based metropolitan application
VirtueMAN
telecommunication traffic
software-defined network architecture
software defined networking
security
SDN-based network architecture
quality of service
authentication
Protocols
Mobile communication
IP-independent forwarding scheme
intranetwork distributed cross-layer traffic control protocol
internet
IEEE 802.11 Standards
Heart beat
distributed network-wide controller
configurable user access control
authorisation
« first
‹ previous
1
2
3
4
5
6
next ›
last »