Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
financial data processing
wearables security
WristSpy
Wearable sensors
single wrist-worn wearable device
personal mobile devices
passcode input scenarios
passcode inference system
parallel PIN inference
parallel pattern inference
multidimensional feature extraction
mobile payment
machine-learning based classification
fine-grained hand movement trajectories
Euclidean distance
wearable computers
Scalability
Pins
Trajectory
Online banking
electronic money
parallel processing
privacy
Mobile handsets
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
mobile computing
authorisation
biblio
Improving Wireless Network Security Based On Radio Fingerprinting
Submitted by aekwall on Mon, 02/17/2020 - 2:34pm
security threats
Wireless Network Security
wireless device transmitters
transient signals
radio transmitters
Radio Frequency Fingerprints
radio frequency fingerprint extraction
radio fingerprinting
physical characteristics
fractional fourier transform
Fourier transforms
identity authentication
wireless networks
sensor security
authorisation
Signal to noise ratio
Transient analysis
Metrics
wireless devices
Communication system security
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
feature extraction
security
telecommunication security
biblio
Enhanced Cryptocurrency Security by Time-Based Token Multi-Factor Authentication Algorithm
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
security enhancement
wallets
transaction processing
time-based token multifactor authentication algorithm
time-based onetime password technique
single level password authentication
multifactor authentication algorithm
MFA token
MFA security scheme
Cryptocurrency security
multifactor authentication
Human Factors
security
cryptocurrency
password
cryptocurrencies
authentication
Computer hacking
Metrics
bitcoin
pubcrawl
Resiliency
authorisation
Computer crime
biblio
A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
smart cards
session key disclosure attacks
secure multifactor remote user authentication scheme
secure multifactor authentication protocol
resource limited devices
Kalra's scheme
communication technology
cloud-IoT environment
cloud-IoT applications
biometrics (access control)
multifactor authentication
Human Factors
security problems
Cloud Computing
password
authentication
Metrics
pubcrawl
Resiliency
embedded devices
Protocols
Cryptographic Protocols
telecommunication security
Internet of Things
Big Data
authorisation
biblio
Securing HPC using Federated Authentication
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
PKI
the U.S. Government PKI
multifactor authentication process
Multi-factor authentication
In Common Federation
HPC system security
federated identity management
federated authentication
external federated identity management systems
basic account maintenance
multifactor authentication
US Department of Defense
public key infrastructure
authorisation
Portals
Human Factors
parallel processing
High performance computing
message authentication
authentication
metadata
Metrics
pubcrawl
Resiliency
learning (artificial intelligence)
security
biblio
Symmetric-Key Multi-Factor Biometric Authentication Scheme
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
multi-factor
symmetric-key multifactor biometric authentication scheme
smart-card
Silicon
Servers
security attacks
Resiliency
pubcrawl
ProVerif
ProVeri
private key cryptography
password
multifactor authentication
authentication
Metrics
identity password
Human Factors
Germanium
Cryptography
Cao and Ge's scheme
Burrows-Abadi-Needham (BAN) logic
biometrics (access control)
biometric techniques
biometric
authorisation
biblio
Multi-Factor Authentication Modeling
Submitted by aekwall on Mon, 02/10/2020 - 12:02pm
multifactor authentication
risk-based authentication
risk management
Resiliency
pubcrawl
patents
password
omnifactor authentication
multiple authentication factors
multifactor authentication modeling
acceptable authentication methods
Metrics
message authentication
knowledge based systems
Human Factors
fraud detection system
Fingerprint recognition
digital fingerprint
authorisation
authentication
biblio
Blockchain Based Fine-Grained and Scalable Access Control for IoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
contracts
Microelectronics Security
transaction
scalable access control
Permission
multiindex table struct
fine-grained access control strategies
decentralized IoT system
access records
access control issue
smart contract
Predictive Metrics
Logic gates
IoT
IoT security
cryptocurrencies
database
blockchain
composability
pubcrawl
Resiliency
Internet of Things
data privacy
authorisation
Access Control
computer network security
biblio
Keystroke Dynamics Using Auto Encoders
Submitted by grigby1 on Tue, 01/28/2020 - 2:35pm
Human Factors
Training
timing
stolen credentials
risk based approach
pubcrawl
password
Metrics
message authentication
machine learning
learning (artificial intelligence)
Keystrokes Dynamics
keystroke dynamics
keystroke analysis
individual user
anomalous typing patterns
Human behavior
Heuristic algorithms
fraud
feature extraction
dynamic flags
digital signatures
digital signature
Cyber Attacks
credential based authentication systems
biometrics (access control)
autoencoders
authorisation
authentication
biblio
Fast and Accurate Continuous User Authentication by Fusion of Instance-Based, Free-Text Keystroke Dynamics
Submitted by grigby1 on Tue, 01/28/2020 - 2:35pm
fused classifier
user input text
text analysis
pubcrawl
monograph
Metrics
keystroke dynamics systems
keystroke dynamics
keystroke analysis
Keyboards
instance-based graph comparison algorithm
Human Factors
Human behavior
account security
free-text keystroke dynamics
free-text data
directed graphs
digraph
continuous user authentication
Continuous Authentication
consecutive keystrokes
biometrics (access control)
biometrics
behavioral biometric system
authorisation
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
…
next ›
last »