Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Fingerprint recognition
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
biblio
Overview on Moving Target Network Defense
Submitted by aekwall on Mon, 09/09/2019 - 10:47am
Scalability
Predictive Metrics
Space exploration
route mutation
research hotspot
port mutation
numerous related works
multiple mutation
MTND
MTD
moving target network defense
IP address and port mutation
IP address
fingerprint mutation
security of data
network level
Fingerprint recognition
Communication networks
internet
Synchronization
pubcrawl
Resiliency
network security
moving target defense
security
IP networks
computer network security
biblio
A New Initial Authentication Scheme for Kerberos 5 Based on Biometric Data and Virtual Password
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
Metrics
virtual password
Three Party Protocol
Symmetric cryptocraphy
strong authentication scenario
Servers
secure session
Resiliency
pubcrawl
Protocols
password-guessing attack
password-based scheme
password
authentication
Kerberos
initial authentication scheme
Human behavior
Fingerprint recognition
data privacy
Cryptography
Cryptographic Protocols
biometrics (access control)
biometric data
bioinformatics
authentication protocol
biblio
Design and Implementation of a Fire Detection andControl System with Enhanced Security and Safety for Automobiles Using Neuro-Fuzzy Logic
Submitted by grigby1 on Wed, 05/01/2019 - 11:30am
Resiliency
ignition
integrated microcontroller-based hardware
Metrics
microcontrollers
modern automobiles
multisensor-based fire detection
Neural networks
neuro-fuzzy logic
neuro-fuzzy system
neurocontrollers
pubcrawl
resilience
Global Positioning System based vehicle tracking
road safety
road traffic control
security
security mechanisms
sensor fusion
software system
system submodules
traffic engineering computing
two-step ignition
vehicle architecture
vehicle tracking
vehicle tracking subsystem
engine control
alcoholdetection
anti-theft systems
Arduino Mega 2560
automobiles
biometric ignition
biometric ignition subsystem
C++11
central control unit
Control System
data fusion
efficiency 80 percent
efficiency 95 percent
alcohol detection
enhanced safety measures
enhanced security
Fingerprint recognition
fire detection
fire detection subsystem
Fires
fuzzy control
Fuzzy logic
fuzzy logiccontrol
fuzzy neural nets
Global Positioning System
biblio
Constructing Browser Fingerprint Tracking Chain Based on LSTM Model
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
LSTM
training set
track Web attackers
stateless tracking technique
Stability analysis
LSTM model
input feature vector
browser fingerprint tracking chain
browser fingerprint evolution
browser fingerprint
recurrent neural nets
Time series analysis
time series
Resiliency
security of data
Compositionality
Browser Security
tracking
Fingerprint recognition
online front-ends
Recurrent neural networks
computer architecture
Browsers
Training
Metrics
Human behavior
pubcrawl
resilience
biblio
FP -TESTER : Automated Testing of Browser Fingerprint Resilience
Submitted by grigby1 on Fri, 04/05/2019 - 10:27am
Browser Security
testing toolkit
software tools
privacy leaks
FP-TESTER
browser vendors
browser tracking
browser fingerprint resilience
Automated Testing
Resiliency
Statistics
Sociology
program testing
Compositionality
privacy
Fingerprint recognition
Browser Fingerprinting
online front-ends
Entropy
Browsers
Metrics
Human behavior
pubcrawl
resilience
testing
security of data
data privacy
internet
biblio
FP-STALKER: Tracking Browser Fingerprint Evolutions
Submitted by grigby1 on Fri, 04/05/2019 - 10:26am
online front-ends
target tracking
Portable document format
FP-STALKER approach
browser instances
Resiliency
Compositionality
Browser Security
Fingerprint recognition
Browser Fingerprinting
privacy
microsoft windows
Browsers
learning (artificial intelligence)
Metrics
Human behavior
pubcrawl
resilience
security
data privacy
biblio
IoT Securing System Using Fuzzy Commitment for DCT-Based Fingerprint Recognition
Submitted by grigby1 on Fri, 03/22/2019 - 12:36pm
Fingerprint recognition
Servers
Scalability
Resiliency
resilience
pubcrawl
Metrics
IoT security
IoT securing system
IoT features
Internet of Things
fuzzy set theory
fuzzy commitment scheme
fuzzy commitment
FRR criteria
authentication
fingerprint identification
feature extraction
FAR criteria
error-corrector codes
encryption system
encryption
discrete cosine transforms
DCT-based recognition method
DCT-based fingerprint recognition
DCT
Databases
Cryptography
computer network security
biometric encryption
biblio
Encryption Using Finger-Code Generated from Fingerprints
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
Fingerprint recognition
smart cards
Scalability
Resiliency
resilience
pubcrawl
minutiae points
minutiae
Metrics
Length measurement
fingerprints
fingerprint ridges
biometric encryption
fingerprint features
fingerprint
finger-code
encryption keys
encryption
Elliptic curve cryptography
Cryptography
cryptographic key generation
biometrics (access control)
biometric key
biblio
Cryptographic and Non-Cryptographic Network Applications and Their Optical Implementations
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
optical implementations
theoretical cryptography
signal processing
secret keys
quantum version
quantum theory
quantum optics
quantum optical versions
Quantum mechanics
quantum mechanical signals
quantum key distribution protocols
quantum advantage
prominent examples
Optical pulses
pubcrawl
noncryptographic network applications
mere conceptual value
Communication Systems
classical signal structures
abstract protocols
quantum cryptography
quantum computing
Optical fiber networks
Optical detectors
Compositionality
Fingerprint recognition
Protocols
composability
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »