Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Servers
biblio
i/k-Contact: A context-aware user authentication using physical social trust
Submitted by BrandonB on Tue, 05/05/2015 - 8:56am
Mobile-device-management (MDM)
visualization
visual contact
user authentication
ubiquitous computing
Trusted Computing
Social trust
Servers
physical trust relationship
physical social trust
Physical communication
authentication
Mobile handsets
i-k Contact mechanism
context-aware user authentication
Context-aware security
Context
Companies
Big Data application
authorisation
authentication system
authentication control
biblio
Remote Login Password Authentication Scheme Based on Cuboid Using Biometric
Submitted by BrandonB on Tue, 05/05/2015 - 8:49am
Cuboid
system security
smart cards
Smart card
Servers
remote login password authentication scheme
password
One way function
Fingerprint recognition
cuboid diagonal
3-D geometry
Computers
computational geometry
Bismuth
biometrics (access control)
biometric value
authorisation
authentication
3D environment
biblio
AccAuth: Accounting system for OAuth protocol
Submitted by BrandonB on Tue, 05/05/2015 - 8:49am
Context
user-centric accounting model
three-party communication protocol
third party application
standards
service provider
Servers
resource usage monitor
Protocols
protected resource access
OAuth protocol
delegation
AccAuth
computer architecture
Cloud Computing
authorized usage
authorized resource usage
authorization
authorisation
authentication
accounting protocols
accounting process
accounting layer
accounting
biblio
A Spoofing Attack against a Cancelable Biometric Authentication Scheme
Submitted by BrandonB on Tue, 05/05/2015 - 8:48am
homomorphic encryption algorithms
Vectors
unexpected vector
spoofing attack
Servers
replay attack
registered biometric information
Public key
privileged entity
network services
list attack
IrisCode
ID-password-based authentication
analogue biometric information
feature vector
encryption
decryption key
Cryptography
competitive code
cancelable biometric authentication scheme
biometrics (access control)
biometric information
binary coding
authorisation
authentication
biblio
Towards Scalability for Federated Identity Systems for Cloud-Based Environments
Submitted by BrandonB on Tue, 05/05/2015 - 8:45am
federated identity management systems
Virtual machining
sticky session mechanism
Shibboleth architecture
Servers
Scalability
Proposals
multitenant authorization
federated identity system scalability
authentication
Cryptographic Protocols
Cloud Computing
cloud based environments
central authentication service
central authentication protocols
CAS
authorisation
biblio
Robust security network association adjusted hybrid authentication schema
Submitted by BrandonB on Tue, 05/05/2015 - 8:44am
monitoring mechanism
wireless vulnerability situation
wireless network
Wireless Intrusion Prevention System
Wireless Intrusion Detection System
Wireless communication
Wired Equivalent Privacy
weak authentication
telecommunication security
Servers
Robustness
robust security network association
Robust Secure Network
radio networks
Network Access Protection
802.11 standards
message authentication
IEEE standards
IEEE security standard
hybrid authentication schema
extensible authentication protocol
encryption
Cryptography
Communication system security
authorization
authorisation
authentication
accounting mechanism
802.1X framework
biblio
FlowNAC: Flow-based Network Access Control
Submitted by BrandonB on Tue, 05/05/2015 - 8:42am
authentication
authorisation
authorization
computer network security
Cryptographic Protocols
EAPoL-in-EAPoL encapsulation
flow-based network access control
FlowNAC
IEEE 802.1X
Network Access Control
Ports (Computers)
Protocols
security
Servers
software defined networking
standards
biblio
Concerns regarding service authorization by IP address using eduroam
Submitted by BrandonB on Tue, 05/05/2015 - 8:41am
IP address
wireless LAN
visited institution
Service Level Agreement
service authorization
Servers
secure WLAN roaming service
secure Internet access
proxy servers
legal agreements
IP-Based
IP networks
authentication credentials
internet
IEEE Xplore
home networks
home institution
home credentials
firewalls
firewall
eduroam
authorization
authorisation
biblio
A Group File Encryption Method using Dynamic System Environment Key
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
dynamic system environment key
system environment key
Servers
security level
security
message authentication
group file encryption
GEMS
file organisation
encryption
eavesdropping attack
auditing security scheme
DRM
decryption method
Cryptography
Computers
Cloud Computing
business data processing
autocrypt
authorization
authorisation
authentication
biblio
An ID-Based User Authentication Scheme for Cloud Computing
Submitted by BrandonB on Tue, 05/05/2015 - 8:37am
anonymity
authentication
authorisation
authorization
Cloud Computing
cloud computing environments
Cryptography
ID-based scheme
ID-based user authentication scheme
Law
mobile devices
Nickel
Servers
user authentication
« first
‹ previous
…
85
86
87
88
89
90
91
92
93
next ›
last »