Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless LAN
biblio
Concerns regarding service authorization by IP address using eduroam
Submitted by BrandonB on Tue, 05/05/2015 - 8:41am
IP address
wireless LAN
visited institution
Service Level Agreement
service authorization
Servers
secure WLAN roaming service
secure Internet access
proxy servers
legal agreements
IP-Based
IP networks
authentication credentials
internet
IEEE Xplore
home networks
home institution
home credentials
firewalls
firewall
eduroam
authorization
authorisation
biblio
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:55pm
IEEE 802.15.4 networks
Zigbee
wireless LAN
Servers
security
Protocols
Payloads
Local area networks
IoT networks
Internet of Things
internet
802.1X
IEEE 802.15.4
IEEE 802.15 Standards
extensible authentication protocol
EAP
Cryptographic Protocols
computer network security
authorization
authorisation
authentication
access control functionality
biblio
Wifi authentication through social networks #x2014; A decentralized and context-aware approach
Submitted by BrandonB on Mon, 05/04/2015 - 2:48pm
telecommunication security
search time reduction
security principles
Servers
smartphone
Social Devices
Social network services
social networking (online)
social networks
search problems
Trusted Computing
ubiquitous computing
WebID
WiFi authentication
WiFi Authentication and Authorization
WiFi router
WiFi-enabled devices
wireless LAN
heuristic
authentication mechanism
authorisation
authorization
context-aware approach
decentralized approach
EAP-SocTLS
EAP-TLS
embedded trust relations
authentication
IEEE 802.11 Standards
message authentication
password
physical proximity
Probes
Protocols
quadratic search complexity
biblio
Achieving privacy preservation in WiFi fingerprint-based localization
Submitted by BrandonB on Mon, 05/04/2015 - 1:23pm
location privacy
wireless LAN
WiFi fingerprint-based localization
smart phones
signal strengths
Servers
real-world environments
PriWFL
privacy-preserving WiFi fingerprint localization scheme
privacy
performance enhancement algorithm
mobile computing
Accuracy
localization service provider
indoor mobility prediction
indoor localization
IEEE 802.11 Standards
Homomorphic encryption
Databases
data privacy
Cryptography
computer network security
computational overhead reduction
Android smartphone
biblio
Accurate WiFi Based Localization for Smartphones Using Peer Assistance
Submitted by BrandonB on Mon, 05/04/2015 - 11:58am
peer assisted localization approach
wireless LAN
WiFi signature map
WiFi fingerprint localization
WiFi based localization method
testing
smartphone
smart phones
Servers
radionavigation
peer phones
Accuracy
Peer Assisted Localization
location based features
indoor radio
indoor localization
IEEE 802.11 Standards
Distance measurement
battery lifetime
Acoustics
acoustic ranging estimates
biblio
Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking
Submitted by BrandonB on Fri, 05/01/2015 - 9:47am
Smart Grids
network performance
network resiliency improvement
plant-generation local area networks
Protocols
SAE
security attacks
security protocols
simultaneous authentication-of-equals
Smart Grid
smart grid mesh network security enhancement
neighborhood area networks
smart power grids
substation local area networks
Substations
trees (mathematics)
wireless LAN
wireless local area networks
wireless mesh networks
wireless sensor networks
WLAN
efficient mesh security association
Computer crime
computer network performance evaluation
computer network security
cost-ef- fective communications
Cryptographic Protocols
cyber attack
denial-of-service attack model
distributed mesh sensor networks
dynamic key distribution strategy updating
authentication
EMSA
HAN
home area networks
home networks
IEEE 802.11s
Logic gates
Merkle tree 4-way handshaking scheme
Mesh networks
NAN
biblio
Selfish insider attacks in IEEE 802.11s wireless mesh networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:46am
Ad hoc networks
IEEE 802.11 Standards
IEEE 802.11s wireless mesh networks
Logic gates
Protocols
quality of service
Routing
selfish insider attacks
telecommunication security
wireless LAN
wireless mesh networks
biblio
Resilient wireless communication networking for Smart grid BAN
Submitted by BrandonB on Fri, 05/01/2015 - 9:43am
smart grid BAN
network security
network topology
Redundancy
resilience
resilient wireless communication networking
round trip time
RTT
sensor placement
Single-hop network
network reliability
Smart Grids
smart meters
smart power grids
telecommunication network reliability
telecommunication network topology
telecommunication security
Wireless communication
wireless LAN
wireless technology
hybrid deployment
building area network
control centre
demand response function
distribution level
DR communication
end to end delay
home area network
home automation
home networks
backbone networks
IEEE 802.11 communication technology
IEEE 802.11 Standards
Infrastructure mode
infrastructure mode smart meter network
infrastructure single hop topology
mesh multiple hop topology
Multi-hop mesh network
network failure
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:06pm
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:06pm
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
« first
‹ previous
1
2
3
4
5
6