Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature
Submitted by aekwall on Mon, 01/18/2021 - 10:25am
Cryptography
user authentication
Servers
security
secret key management technology
secret key management issues
Secret key management
public key cryptography
pubcrawl
key management devices
Fuzzy signature
fuzzy set theory
Fuzzy Cryptography
digital signatures
decentralized payments
key management
blockchain technology
blockchain system
biometrics-based digital signature scheme
biometrics fuzzy signature
Biometrics authentification
biometrics (access control)
biometric information
authorisation
authentication
Human behavior
Metrics
Resiliency
Scalability
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 10:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Deepfake: A Survey on Facial Forgery Technique Using Generative Adversarial Network
Submitted by grigby1 on Fri, 01/15/2021 - 11:11am
celebrities
generative adversarial networks
Motion pictures
Face
neural network
video signal processing
DeepFake
AI technology
authentic people
generative adversarial network
character defamation
Deepfake technique
election process
face video forgery technique
facial forgery technique
high-profile politician
social media platform
unauthentic spurious video
Resiliency
authorisation
machine learning
behavioural sciences computing
Neural networks
pubcrawl
Human behavior
Human Factors
resilience
Training
Generators
Scalability
neural nets
deep learning
Metrics
face recognition
social networking (online)
biblio
Remote Access Control Model for MQTT Protocol
Submitted by aekwall on Mon, 01/11/2021 - 12:32pm
access control model
data deletion
TLS protocol
third-party services
remote access control model
OAuth protocol
Internet of Things security problems
device discretionary access control model
data transferring
access privileges
access matrix
security
secure access control
MQTT protocol
MQTT
privacy
pubcrawl
Cryptographic Protocols
Internet of Things
authorisation
Scalability
computer network security
biblio
Security and Privacy Analysis of Wearable Health Device
Submitted by grigby1 on Mon, 12/28/2020 - 11:28am
security
mobile computing
mobile devices
mobile health
mobile wearable health devices
privacy
privacy breach
privacy features
Privacy Risk
pubcrawl
resilience
Resiliency
malicious attack
Security analysis
security risk
security vulnerability
sensitive data information
sensitive information
Servers
telecommunication security
user data security
user sleeping arrangements
Wearable devices
dieting formula
authorisation
Biomedical monitoring
Bluetooth
Bluetooth networking
Bluetooth pairing process
bluetooth security
composability
Computer crime
data privacy
Data Security
wearables security
eating constraint
fitbit
Google Glass
Hacker
health care
health monitor system
health tracker devices
Human behavior
human health parameter monitoring
Jawbone
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
attacks
wireless communication pervasive technology
slave impersonation attacks
secure connection establishment
secure authentication procedure
mandatory mutual authentication
impersonation
Bluetooth version
Bluetooth standard
Bluetooth Impersonation AttackS
Bluetooth devices
Bluetooth chips
BIAS attacks
authentication procedure
bluetooth security
wireless security
authorisation
mobile radio
ubiquitous computing
composability
standards
Protocols
Cryptography
authentication
performance evaluation
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
biblio
Bridge the Trustworthiness Gap amongst Multiple Domains: A Practical Blockchain-based Approach
Submitted by aekwall on Mon, 12/21/2020 - 12:33pm
contracts
trustworthiness-protection system
trustworthiness management
trustworthiness gap
trusted corporations
multiple-domain business partners
malicious falsification attacks
Isolated data islands
global trustworthiness
data trustworthiness
cloud-based prototype
blockchain-based approach
Prototypes
edge computing
Cloud Computing
Virtual machining
ethereum
trustworthiness
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Trusted Computing
Organizations
data privacy
authorisation
biblio
A Resource Management Model for Real-time Edge System of Multiple Robots
Submitted by grigby1 on Thu, 12/17/2020 - 12:54pm
resource security access control
policy-based governance
pubcrawl
real-time edge system
resilience
Resiliency
resource access control
resource allocation
resource isolation
operating systems (computers)
resource security isolation protection
robot hardware modules
Robot Operating System
robot operating systems
security
security of data
software modules
telecommunication security
isolation model
day industrial productions
edge computing
fault detection
fault location
hierarchical management
Human behavior
Human Factors
industrial robots
authorisation
light-weight edge devices
lightweight edge device
mission-critical resource classification
multi-robot systems
multilevel security data isolation transmission
multiple robot arms
multiple robots
novel resource management model
biblio
Policy-Based Access Control for Robotic Applications
Submitted by grigby1 on Thu, 12/17/2020 - 12:38pm
privacy leakage
Service robots
security aspects
security
ROS
robots
robotic systems
robotic applications
Robot sensing systems
robot programming
robot operating systems
Robot Operating System
Resiliency
resilience
pubcrawl
Access Control
policy-based governance
Policy-based access control
permissions
operating systems
modern robots
Human Factors
Human behavior
extended policy-based access control model
data privacy
basic permission control mechanism
authorisation
Adaptation models
access control mechanism
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
…
next ›
last »