Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 1:23pm
pubcrawl
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
Identity-of-Things (IDoT)
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
distributed identity management model
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
Access Control
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
biblio
Identity management using permissioned blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 1:23pm
public key cryptography
identity cards
Identity management
identity management capabilities
identity thefts
India
permissioned blockchain
person identity authentication
personal data hashing
privacy
privacy concepts
private key cryptography
pubcrawl
Human behavior
public-private keys
resilience
Resiliency
Scalability
score-card
security
Self-Sovereign Identity
smart cards
smart contracts
unauthorized hands
US Home Land Security
efficient identity management
authorisation
Bitnation
blockchain technology
contracts
cryptocurrencies
data privacy
design information security
Digital India
distributed ledger
Distributed trust model
distribution control
e-Residency
Aadhar-card
Estonia
ethereum
Fabrics
financial data processing
fraud
fraud cases
Government
government agencies
government data processing
hashing algorithms
homeland security enterprise
biblio
Governing Principles of Self-Sovereign Identity Applied to Blockchain Enabled Privacy Preserving Identity Management Systems
Submitted by grigby1 on Mon, 03/29/2021 - 1:22pm
IdM
uPort
SSI ecosystem
SSI
Sovrin
Self-Sovereign Identity
Scalability
Resiliency
resilience
Reliability
pubcrawl
privacy
Principles of SSI
numerous governing principles
IDM systems
IDM system
Analytical models
identity management system
Identity management
Human behavior
federated identity management
Ecosystems
distributed ledger
digital transformation
digital services
Digital identity
digital form
data privacy
Cryptography
blockchain enabled privacy preserving identity management systems
blockchain
authorisation
biblio
Keystroke Identifier Using Fuzzy Logic to Increase Password Security
Submitted by grigby1 on Mon, 03/29/2021 - 1:03pm
fuzzy systems
typing speed
security
secure log-in
Resiliency
resilience
pubcrawl
password security
password
normal password entry session
Metrics
message authentication
machine learning
keystroke identifier
authorisation
fuzzy system
Fuzzy logic
entity behavior analytics
delays
Delay effects
Cybersecurity
cybercriminal
Cybercrime
Cyber Physical System
correct password
computer security
Computer crime
Companies
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 12:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
A Formal Model for the Automatic Configuration of Access Protection Units in MPSoC-Based Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 10:56am
Resiliency
MPSoC-based embedded systems
multiple processing cores
multiprocessing systems
multiprocessor system-on-chip
on-chip isolation
pubcrawl
real-time systems
resilience
model-based design
Safety
safety-critical embedded system
safety-critical software
security
security-critical embedded system
system-level isolation
system-on-chip
timing
dedicated access protection units
access permissions
access protection
access protection unit
authorisation
Code Generation
composability
configuration code
Data protection
abstract permission declarations
embedded systems
formal model
Hardware
heterogeneous system-on-chip platforms
information flow requirements
information flow tracking
internal communication links
Metrics
biblio
Provenance-based Classification Policy based on Encrypted Search
Submitted by aekwall on Mon, 03/22/2021 - 12:08pm
Predictive Metrics
Encrypted Search
encryption
encryption audits
Games
information retrieval
integrity data
keyword searching
Offline Guessing Attack
pattern classification
encrypted provenance
Privacy Third Party Auditing
provenance-based classification policy
pubcrawl
Public key
security
security protection
semantic security
sensitive information
storage management
cloud document classification
Human behavior
Metrics
Resiliency
composability
Access Control
Adaptation models
authorisation
Cloud Computing
cloud data
Provenance
cloud storage
Compositionality
Cryptography
data integrity
data quality
digital provenance
digital signatures
document category
document handling
biblio
Traceable Ciphertext Policy Attribute-based Encryption Scheme with User Revocation for Cloud Storage
Submitted by aekwall on Mon, 03/22/2021 - 12:07pm
fine-grained access control
user identity tracking
traceable ciphertext policy attribute-based encryption scheme
single user revocation
identity directory technology
forward security
ciphertext re-encryption technology
association revocation
associated user revocation
CP-ABE
user revocation
CP-ABE scheme
encryption audits
Traceability
Cloud Computing
Compositionality
Predictive Metrics
storage management
Vegetation
pubcrawl
Resiliency
private key cryptography
data privacy
cloud storage
encryption
authorisation
Access Control
Servers
biblio
A Captcha-Based Graphical Password With Strong Password Space and Usability Study
Submitted by grigby1 on Thu, 03/18/2021 - 1:37pm
human computer interaction
visualization
visual symbols
user personal information security
user authentication
usability
smartphone
smart phones
pubcrawl
password
mobile device
mobile computing
message authentication
alphanumeric symbols
Human behavior
graphical user interfaces
Graphical Password
Entropy
composability
click symbols alphabet
captchas
Captcha-based password
Captcha security
captcha based graphical password
authorisation
authentication
biblio
Image Steganography Method to Achieve Confidentiality Using CAPTCHA for Authentication
Submitted by grigby1 on Thu, 03/18/2021 - 1:36pm
encryption
user interfaces
telecommunication security
Steganography
randomized CAPTCHA code
pubcrawl
police department
medical fields
least significant bit
intended receiver
image steganography method
image data
image colour analysis
Image coding
image
Human behavior
achieve confidentiality
detective investigation
decryption mechanism
decryption
decoding tools
data hiding technique
data encapsulation
Cryptography
confidentiality
composability
captchas
CAPTCHA codes
CAPTCHA
authorisation
authentication
authenticated user
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »