Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
Conundrum-Pass: A New Graphical Password Approach
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
graphical password system
pattern locks
unlocking time
trivial password methodologies
textual passwords
smudge attacks
shoulder surfing
security element
pattern lock
Password Submission
Password Registration
multiple chunks
mobile computing environment
graphical passwords
Scalability
graphical password schemes
Graphical Password
external attacks
conundrum-pass
password guessing
Computer graphics
dictionary attacks
authentication
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Security Lock with Effective Verification Traits
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
speech pattern recognition
multilevel security system
multiple layer security system
physical security
Raspberry Pi microcomputers
recognition
security lock
security locker solution
smart box
multi-layer
Speech recognition
TensorFlow
vein pattern recognition
vein recognition
Veins
verification traits
Viola and Jones
pattern locks
pubcrawl
Scalability
authorisation
Linux
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
security
password
Cameras
Fingerprint recognition
face recognition
facial recognition
graphical user interfaces
interactive GUI
machine learning operations
biblio
—Multiple Cluster-Android lock Patterns (MALPs) for Smart Phone Authentication‖
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
cluster based progressive smart lock
pattern locks
Smart phone lock
smart phone authentication
smart lock facilities
smart android mobile phone
single authentication system
progressive authentication service
Pattern
multiple cluster-android lock patterns
multiple cluster based pattern match system
mobile phone user
dependent combination
Scalability
cluster
ALP
Android (operating system)
authentication
pattern matching
smart phones
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
open source Virtual Private Network
WireGuard virtual private network protocol
vpn
Virtual private networks
verification
transport data messages
standards
security protocols
pubcrawl
Protocols
protocol verification
privacy
policy-based governance
Policy Based Governance
authorisation
Noise Protocol Framework
IP networks
Elliptic curve cryptography
CryptoVerif proof assistant
Cryptographic Protocols
cryptographic protocol
cryptographic proof
computer network security
computational model
Compositionality
composability
collaboration
biblio
Privacy Policies Model in Access Control
Submitted by grigby1 on Fri, 04/03/2020 - 12:32pm
access control management
Privacy Policies
user identification
Task Analysis
Proposals
privacy policy strategy
privacy policy model
privacy policies model
personal data privacy
Internet services
data exchange
privacy
access control language
cloud environments
information security
authorization
Scalability
data privacy
Human behavior
pubcrawl
Cloud Computing
authorisation
biblio
Managing Security Policies within Cloud Environments Using Aspect-Oriented State Machines
Submitted by grigby1 on Fri, 04/03/2020 - 12:05pm
pubcrawl
formal verification
high level languages
middleware
middleware service
multitenancy architecture
Openstack cloud environment
Organizations
policy anomalies
Policy Based Governance
finite state machines
safety problems
security
security policies anomalies
security policy management
space complexity
specification languages
Time complexity
verification tools
XACML policies
Cloud Computing
Anomaly Detection
Anomaly Detection and Resolution
AO-FSM
aspect-oriented finite state machines
Aspect-oriented programming
aspect-oriented state machines
authorisation
automata
availability problems
access control policy management
cloud environments
cloud policy verification service
cloud service
collaboration
computer architecture
conflicts
distributed policy management
domain-specific language state machine artifacts
biblio
Need of Private and Public Sector Information Security
Submitted by grigby1 on Fri, 04/03/2020 - 12:03pm
private buildings
Intel
Intelligent systems
Internet of Things
knowledge based systems
man in middle
Organizations
personnel security
Policy Based Governance
Portable computers
information technicians
private sector information security
pubcrawl
public sector information security
sensitive information
sentinel systems
smart information security Intel processes
Standards organizations
virtual data tables
Data protection
Airports
AS-IS office system
authorisation
biometric
biometrics (access control)
Buildings
collaboration
conveyor belts
data entry-exit log
airport like security with digital boxes
digital bar-coded air port
digital bar-coded conveyor boxes
evaes-dropping
government buildings
government data processing
government offices
information security
information stealing
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR code
secure transaction confirmation
secure private key storage
QR code-based android application
hot wallet application
Hot Wallet
hardware wallet
digital online transaction
cryptocurrency wallet
cross QR code scanning
cold wallet
bitcoin transaction
transaction processing
Android applications
QR codes
authorisation
Android (operating system)
electronic money
cryptocurrency
cyber physical systems
smart phones
blockchain
Cryptography
Peer-to-peer computing
pubcrawl
Resiliency
mobile computing
private key cryptography
data privacy
biblio
Mitigation of hard-coded credentials related attacks using QR code and secured web service for IoT
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
QR codes
SSL
security concerns
secured web service
Response code
QR code based approach
lightweight security algorithm
hard-coded credentials related attacks
Hard-coded credentials
GUI
clear text log-in id
password
IoT manufacturers
computer network security
QR code
cyber physical systems
web services
pubcrawl
Resiliency
invasive software
IoT devices
Internet of Things
Cryptography
authorisation
DDoS
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »