Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile radio
biblio
Secure Public Key Regime (SPKR) in vehicular networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:42pm
lower authentication delay
vehicular networks
vehicles
secure public key regime
Schnorr signature
road side units
public key cryptography
Public key
pubcrawl170109
preauthentication mechanism
mobile radio
authentication
digital signatures
Denial of Service attacks
denial of service attack
delegated trusted authorities
Computer crime
complex certificate verification process
Collusion Attacks
collusion attack
certificate-less PKI
certificate revocation list
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks
biblio
"New Secured Steganography Algorithm Using Encrypted Secret Message inside QRTM Code: System Implemented in Android Phone"
Submitted by grigby1 on Tue, 02/14/2017 - 12:16pm
encryption
three-step security
Steganography
standards
smart phones
secured steganography algorithm
QRTM Code
QR codes
QR code
pubcrawl170102
mobile radio
android
encrypted secret message
Cryptography
cryptanalysis
Computers
computer science
Ciphers
bit level columnar transposition method
Android phone
Android mobile environment
biblio
SAFE: Security-Aware FlexRay Scheduling Engine
Submitted by BrandonB on Wed, 05/06/2015 - 2:13pm
FlexRay static segment schedule
X-by-wire system
telecommunication security
security-aware FlexRay scheduling engine
scheduling
Safety
Safe
Runtime
Protocols
mobile radio
active safety functions
field programmable gate arrays
end-to-end latencies
communication protocol
communication middleware
Automotive engineering
automotive electronics
automotive electrical-electronic systems
automotive domain
authentication
biblio
Behavioral Malware Detection in Delay Tolerant Networks
Submitted by BrandonB on Wed, 05/06/2015 - 10:33am
DTN model
Silicon
short-range communication technologies
proximity malware
polymorphic malware
obfuscated malware
naive Bayesian model
modern mobile consumer electronics
mobile radio
Mathematical model
malware
invasive software
filtering theory
Equations
adaptive look ahead
dogmatic filtering
delay-tolerant-network model
Delay-tolerant networks
delay tolerant networks
Bluetooth
behavioral malware characterization
behavioral characterization
Bayesian methods
Bayesian malware detection
Bayesian filtering
Bayes methods
aging
biblio
Improved privacy-preserving authentication scheme for roaming service in mobile networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:07pm
Password authentication
user authentication
user anonymity
telecommunication security
symmetric-key techniques
smart cards
Smart card
security-related issues
security mechanism
roaming service
Roaming
Protocols
authentication
offline password guessing attacks
nontamper-resistant assumption
mobile users
mobile radio
mobile networks
mobile computing
Mobile communication
message authentication
improved privacy-preserving two-factor authentication scheme
Cryptography
biblio
DAIDS: An Architecture for Modular Mobile IDS
Submitted by BrandonB on Thu, 04/30/2015 - 1:26pm
intrusion detection system
third party mobile applications
telecom operator
security of data
profile applications
North America
Monitoring
modular mobile IDS
mobile radio
mobile devices
mobile computing
malware
malicious behavior
Android (operating system)
Intrusion Detection
Humanoid robots
dynamic analysis
Detectors
detection algorithms
Databases
DAIDS
behavior profiling
behavior analysis
Anomaly Detection
Androids
Android platform
« first
‹ previous
1
2
3
4
5