Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile handsets
biblio
A User Centric Identity Management for Internet of Things
Submitted by BrandonB on Tue, 05/05/2015 - 8:42am
authentication
authorisation
authorization
device authentication
device identity
identity management systems
IDM system
Internet of Things
Medical services
Mobile handsets
user centric identity management
user identity
biblio
Urban traffic commuting analysis based on mobile phone data
Submitted by BrandonB on Mon, 05/04/2015 - 2:38pm
OD information
urban traffic commuting analysis
trip generation mechanism
trip attraction
traffic information systems
traffic information extraction
Statistics
Sociology
real-time systems
pattern clustering
Base stations
mobile phone data acquisition
Mobile handsets
mobile computing
Mobile communication
k-means clustering algorithm
feature extraction
data acquisition
Cities and towns
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 2:16pm
Mobile communication
wireless sensor networks
user privacy protection
sensors
security of data
privacy level
privacy
performance evaluation
participatory sensing
mobile phones
Mobile handsets
mobile devices
mobile computing
ban zones
map-based silent zones
location data
large-scale sensing systems
k-anonymity
habitat density
embedded sensors
dynamic map-based blinding out
data privacy
Cities and towns
cartography
Buildings
biblio
Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
malware detection
transformation attacks
operating systems (computers)
obfuscation techniques
next-generation solutions
mobile malware threats
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile
malware transformation
android
malware authors
malware
invasive software
Humanoid robots
encryption
DroidChameleon
commercial mobile antimalware products
anti-malware
Androids
Android antimalware
biblio
Application H-Secure for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 1:16pm
mobile operating system
Graphical Password
graphical user interfaces
H-Secure application
invasive software
malicious code
malware
Mobile communication
mobile computing
Mobile handsets
free-download content
mobile operating systems
mobile security applications
open devices
personal data
private key cryptography
Servers
smart phones
unauthorized person
Web server
confidential file storage
Android (operating system)
Android smart phones
application stores
authentication
authorisation
business applications
business data
confidential business information
confidential data storage
AES Encryption and Decryption
data access
decryption process
destination servers
employee-owned device
encrypted file
encryption
encryption key
free-download apps
biblio
Mobiflage: Deniable Storage Encryptionfor Mobile Devices
Submitted by BrandonB on Mon, 05/04/2015 - 1:10pm
Humanoid robots
storage encryption
Steganography
steganographic techniques
plausibly deniable encryption
PDE
Mobile Platform Security
Mobile handsets
mobile environment
mobile devices
mobile computing
Mobile communication
Mobiflage
MF-SD
MF-MTP variant
Law
Android (operating system)
File system security
FAT32 removable SD cards
Ext4 file system mechanisms
encryption
desktop OS
desktop environment
deniable storage encryption
deniable encryption
decryption keys
data-block allocator
data confidentiality
Cryptography
Androids
Android OS
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Human acoustic fingerprints: A novel biometric modality for mobile security
Submitted by BrandonB on Mon, 05/04/2015 - 11:31am
mobile devices
unsupervised learning approach
transient evoked otoacoustic emission
Training
Time-frequency Analysis
security
pre-enrolled identity gallery
otoacoustic emissions
Otoacoustic Emission
Neural networks
neural nets
Mobile Security
Mobile handsets
mobile environment
Acoustic signal processing
mobile computing
Mobile communication
mobile biometric system
learning model
learning (artificial intelligence)
human acoustic fingerprints
generic dataset
feature extraction
blind recognition problem
biometrics (access control)
Biometric Verification
biometric modality
Autoencoder Neural Network
biblio
Trusted Platform Module for Smart Cards
Submitted by BrandonB on Fri, 05/01/2015 - 9:09am
near-field communication
User Centric Tamper-Resistant Device
user centric smart card ownership model
UCTD
UCOM
trusted service manager
Trusted Platform Module
Trusted Execution Environment
TEE
smart cards
security
Runtime
privacy preservation platforms
off-card trusted relationship
application provider
near field communication-based mobile phone services
multiapplication smart card initiative
Mobile handsets
Mobile communication
Hardware
global platform consumer centric model
embedded devices
deployment model
data privacy
cross-device security
computer architecture
Computational modeling
biblio
MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks
Submitted by BrandonB on Thu, 04/30/2015 - 1:30pm
social links
Mobile handsets
mobile social networks
mobile users
MSN
nonsemantical trust representation
Pragmatics
real-world mobile dataset
security of data
mobile devices
Social network services
social networking (online)
trust
trust graph
Trust models
trust value evaluation
Trusted Computing
Computational modeling
mobile context aware trust model
mobile context
mobile computing
Mobile communication
MobiFuzzyTrust inference mechanism
linguistic terms
graph theory
fuzzy trust inference mechanism
fuzzy set theory
fuzzy reasoning
fuzzy linguistic technique
fuzzy inference
distributed public virtual social spaces
Context modeling
Context
« first
‹ previous
…
3
4
5
6
7
8
9
10
11