Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile handsets
biblio
Transparent authentication systems for mobile device security: A review
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
multimodal
user re-authentication
usability
transparent authentication systems
transparent authentication
text messages
task re-authentication
sensors
sensitivity application level
sensitive data
security improvement
pubcrawl170115
point-of-entry authentication
personal information
performance evaluation
authentication
mobile user
Mobile Security
Mobile handsets
mobile devices
mobile device security
mobile computing
Mobile communication
keystroke
Fingerprint recognition
Data protection
contact lists
biometric
behavioural profiling
authorisation
biblio
Analysis of content copyright infringement in mobile application markets
Submitted by grigby1 on Tue, 03/07/2017 - 1:38pm
network locations
Writing
Windows mobile applications
video content
URL
unofficial mobile markets
Uniform resource locators
Servers
search keywords
search criteria
pubcrawl170109
pirated content streaming
paid streaming content
paid entertainment
android
Mobile handsets
mobile devices
mobile computing
Mobile communication
mobile application markets
Java
ios
Humanoid robots
cyber-lockers
copyright
content copyright infringement
back-end servers
Androids
biblio
"A new mobile payment protocol (GMPCP) by using a new key agreement protocol (GC)"
Submitted by grigby1 on Thu, 02/23/2017 - 12:12pm
mobile computing
wireless network technology
security of data
Repudiation
replay attack
pubcrawl170105
Protocols
privacy protection
privacy
mobile payment protocol
Mobile handsets
mobile devices
client centric model
Mobile communication
key agreement protocol
golden mobile pay center protocol
Golden Circle
GMPCP
GC
financial management
cyber security
Cryptography
Complexity theory
biblio
"Detecting Security Threats Using Mobile Devices"
Submitted by abfox on Tue, 02/14/2017 - 2:30pm
Monitoring
telecommunication traffic
Servers
security threats detection
security threat detection
security of data
security
pubcrawl170101
Ports (Computers)
performance escalation
advanced persistent threat
Mobile handsets
mobile devices
mobile computing
distributed denial-of-service
DDoS Attack
Data collection
covering array
combinatorial testing
advanced persistent threats
biblio
"Real time secure end to end communication over GSM network"
Submitted by grigby1 on Tue, 02/14/2017 - 12:18pm
GSM speech channel
transcoding
speech trans-coding process
Speech
real time secure end to end communication
pubcrawl170102
Modem
mobile phones
Mobile handsets
Mobile communication
cellular radio
GSM network
GSM
encryption
digital techniques
decryption
decoding algorithm
Cryptography
Codecs
biblio
TorWard: Discovery of malicious traffic over Tor
Submitted by BrandonB on Wed, 05/06/2015 - 1:56pm
malicious traffic discovery
Tor exit routers
Tor
telecommunication traffic
telecommunication network routing
spam
Servers
Ports (Computers)
Peer-to-peer computing
P2P traffic
Mobile handsets
malware
Bandwidth
malicious traffic categorization
Malicious Traffic
low-latency anonymous communication system
Logic gates
intrusion detection system
IDS alerts
IDS
DoS
denial-of-service attack traffic
Computers
computer network security
biblio
Personalized authentication procedure for restricted web service access in mobile phones
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
mobile computing
web services
smart phones
Servers
security
restricted Web service access
personalized authentication procedure
performance evaluation
multilevel authentication procedure
Multi-Level Authenticatio
mobile phones
Mobile handsets
authentication
Mobile communication
malware intrusions
internet
face recognition
biometrics (access control)
biometric signature acquisition device
Biometric Recognition
biometric face recognition
biometric capture device
authorisation
biblio
App vetting systems: Issues and challenges
Submitted by BrandonB on Tue, 05/05/2015 - 10:55am
computer security
information technology
Laboratories
Mobile communication
Mobile handsets
NIST
biblio
Entity title architecture extensions towards advanced quality-oriented mobility control capabilities
Submitted by BrandonB on Tue, 05/05/2015 - 9:49am
mobile computing
wireless quality conditions
wireless communication systems
Wireless communication
Streaming media
session quality requirements
quality of service
point of attachment decision
PoA candidates
PoA
networking functions
Multimedia communication
mobility management (mobile radio)
mobile multimedia networking
Mobile handsets
mobile devices
active session flows
MATLAB
Manganese
internet
information-centric entity title architecture
handover setup
Handover
future Internet clean slate approach
FI
ETArch
entity title architecture extensions
distinct applications scenario
delays
beyond-IP networking services
advanced quality-oriented mobility control capabilities
biblio
i/k-Contact: A context-aware user authentication using physical social trust
Submitted by BrandonB on Tue, 05/05/2015 - 8:56am
Mobile-device-management (MDM)
visualization
visual contact
user authentication
ubiquitous computing
Trusted Computing
Social trust
Servers
physical trust relationship
physical social trust
Physical communication
authentication
Mobile handsets
i-k Contact mechanism
context-aware user authentication
Context-aware security
Context
Companies
Big Data application
authorisation
authentication system
authentication control
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
next ›
last »