Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authorisation
biblio
A Novel Approach of Unprivileged Keylogger Detection
Submitted by grigby1 on Fri, 09/04/2020 - 3:17pm
Keyboards
BIOS Security
userspace keylogger detection
unprivileged keylogger detection
surveillance software
spyware
privileged
operating system kernels
monitoring software
malware packages
keystroke simulation
keystroke logger
Keylogger userspace
Kernel keylogger
confidential data stealing
authorisation
microsoft windows
Human Factors
Kernel
Computers
resilience
Resiliency
Metrics
pubcrawl
mobile computing
security
invasive software
Scalability
Monitoring
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
Mitigating JTAG as an Attack Surface
Submitted by grigby1 on Fri, 08/28/2020 - 11:51am
private instructions
JTAG test access ports
JTAG-based debug
key registers
key systems
materiel availability issues
Metrics
microprocessor chips
on-chip embedded instrumentation
JTAG interface
pubcrawl
resilience
Resiliency
reverse engineering
Scalability
security
standard test access port
system memory
Cryptography
authorisation
BIT
boundary scan
boundary scan architecture
boundary scan testing
Built-In Test
chip lock
computer debugging
attack surface
debug architectures
depot system repair
embedded systems
firmware
IEEE 1149.1
IEEE standards
joint test action group standards
JTAG
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
Securing User Access at IoT Middleware Using Attribute Based Access Control
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
pubcrawl
user access control
typical IoT system model
middleware layer
IoT system architecture
IoT gateway
device data
attribute based access control
IoT middleware
data handling
internetworking
middleware
Logic gates
authentication
policy-based governance
security
Human behavior
data encryption
IoT devices
Internet of Things
attribute-based encryption
Cryptography
authorization
authorisation
Access Control
ciphertext-policy attribute-based encryption
Scalability
computer network security
IoT
biblio
Using Attribute-Based Encryption on IoT Devices with instant Key Revocation
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
pubcrawl
sensor readings
sensor devices
resource constraint devices
Identity-based encryption
cryptographic cipher-texts
ABE cipher-texts
IoT services
Ciphers
Data protection
policy-based governance
Scalability
Human behavior
data encryption
IoT devices
Internet of Things
Conferences
attribute-based encryption
data privacy
encryption
Cryptography
authorisation
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
wireless sensor networks
technological vision
industrial IoT applications
fABElous
ciphertext-policy attribute-based encryption
broadcast
attribute-based scheme
ABE techniques
ABE scheme
CP-ABE
communication overhead
actuators
Constrained Devices
Intelligent sensors
Scalability
policy-based governance
pubcrawl
Human behavior
embedded devices
data integrity
Internet of Things
attribute-based encryption
abe
encryption
data confidentiality
Cryptography
authorisation
Access Control
biblio
Attribute-Based Access Control in Service Mesh
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
authentication
software infrastructure layer
service mesh mechanisms
Service Mesh
modern cloud applications
interservice interaction
highly dynamic environment
Attribute-based encryption methods
service discovery
Temperature sensors
fine-grained access control
Buildings
Cloud Computing
policy-based governance
pubcrawl
Human behavior
Protocols
attribute-based encryption
encryption
Cryptography
authorisation
Access Control
Scalability
biblio
Multi-Authority Attribute-Based Encryption for Resource-Constrained Users in Edge Computing
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
Computational modeling
outsourced decryption
Online/Offline Encryption
multiauthority attribute-based encryption
Multi-Authority Attribute-Based Encryption
MA-ABE schemes
large-universe MA-CP-ABE scheme
ciphertext pool
encryption algorithm
Performance analysis
fine-grained access control
edge computing
IoT
policy-based governance
pubcrawl
Human behavior
Internet of Things
attribute-based encryption
data privacy
Access Control
encryption
Cryptography
authorisation
Scalability
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »