Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
impersonation
biblio
BIAS: Bluetooth Impersonation AttackS
Submitted by grigby1 on Mon, 12/28/2020 - 11:27am
attacks
wireless communication pervasive technology
slave impersonation attacks
secure connection establishment
secure authentication procedure
mandatory mutual authentication
impersonation
Bluetooth version
Bluetooth standard
Bluetooth Impersonation AttackS
Bluetooth devices
Bluetooth chips
BIAS attacks
authentication procedure
bluetooth security
wireless security
authorisation
mobile radio
ubiquitous computing
composability
standards
Protocols
Cryptography
authentication
performance evaluation
telecommunication security
Resiliency
resilience
Human behavior
pubcrawl
Bluetooth
biblio
Security of Okamoto Identification Scheme: A Defense Against Ephemeral Key Leakage and Setup
Submitted by grigby1 on Thu, 05/24/2018 - 11:19am
composability
Compositionality
ephemeral random values
GDH
Identification
impersonation
leakage
Metrics
Okamoto scheme
provable security
pubcrawl
resilience
Resiliency
security reduction
simulatability
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 10:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
biblio
Social Engineering in Social Networking Sites: The Art of Impersonation
Submitted by BrandonB on Thu, 04/30/2015 - 12:50pm
social engineering victimization
physical crime
Receivers
security
sexual abuse
SNS
social aspects of automation
social engineering
social engineering traps
Phishing
social engineeringtactics
social networking (online)
Social networking sites
source credibility
threats
Trust management
user susceptibility
attacker
Organizations
large information base
Interviews
information security management
impersonation
identity theft
human behaviors complexity
grounded theory method
fraudulent people
fraud
financial abuse
Facebook
encoding
deceptive people
Computer crime