Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
Blockchain and the Identity based Encryption Scheme for High Data Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
file organisation
storage management
Scalability
Resiliency
resilience
pubcrawl
private document storage
message authentication
Identity management
identity based encryption management
identity based encryption
Human behavior
high data security
hash algorithms
fraud
authentication
document handling
Distributed databases
data storage
Data protection
data privacy
data integrity
Cryptography
Consensus algorithm
Consensus
blockchain technology
blockchain
authorization
authorisation
biblio
Keystroke Identifier Using Fuzzy Logic to Increase Password Security
Submitted by grigby1 on Mon, 03/29/2021 - 2:03pm
fuzzy systems
typing speed
security
secure log-in
Resiliency
resilience
pubcrawl
password security
password
normal password entry session
Metrics
message authentication
machine learning
keystroke identifier
authorisation
fuzzy system
Fuzzy logic
entity behavior analytics
delays
Delay effects
Cybersecurity
cybercriminal
Cybercrime
Cyber Physical System
correct password
computer security
Computer crime
Companies
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
Fixed Point Attack on Lin et al.’s Modified Hash Function Scheme based on SMALLPRESENT-[8] Algorithm
Submitted by aekwall on Mon, 03/29/2021 - 12:07pm
Hash functions
SMALLPRESENT-[8] algorithm
SMALLPRESENT-[8]
mac
Lin et al.’s scheme
Lin et al.’s modified scheme
hash function message authentication codes block cipher based scheme
fixed point messages discovery
fixed point attack
Compression function
hash algorithms
Cryptography
scheduling
Transforms
Compositionality
Ciphers
pubcrawl
message authentication
authentication
Resiliency
Classification algorithms
encryption
biblio
A Novel Privacy Preserving HMAC Algorithm Based on Homomorphic Encryption and Auditing for Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:05pm
Python
hash message authentication code
HMAC
message authentication
Predictive Metrics
privacy preserving HMAC algorithm
programming
pubcrawl
Public Examine
encryption audits
Resiliency
RSA
RSA algorithm
stable audit program
third party auditor
TPA
user data
Cryptography
AES
AES algorithm
auditing
basic security threats
Cloud Computing
cloud data
Compositionality
confidentiality
user privacy in the cloud
data authentication
data integrity
data privacy
Data protection
Data uprightness
decryption
encryption
biblio
A Captcha-Based Graphical Password With Strong Password Space and Usability Study
Submitted by grigby1 on Thu, 03/18/2021 - 2:37pm
human computer interaction
visualization
visual symbols
user personal information security
user authentication
usability
smartphone
smart phones
pubcrawl
password
mobile device
mobile computing
message authentication
alphanumeric symbols
Human behavior
graphical user interfaces
Graphical Password
Entropy
composability
click symbols alphabet
captchas
Captcha-based password
Captcha security
captcha based graphical password
authorisation
authentication
biblio
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Submitted by grigby1 on Tue, 03/09/2021 - 3:02pm
pubcrawl
IoTs-Cloud
key agreement
local binary pattern
LSB
message authentication
Metrics
one-time bio-key
one-time message-image document code
one-time random pixel sequence
IoT-cloud
Receivers
resilience
Resiliency
robust message anonymity
Scalability
security
Security analysis
smart devices
Watermarking
document image processing
Bio- MAC
bio-authentication scheme
bio-key management
biometrics (access control)
BIOS
Cloud Computing
Cryptography
data integrity
disappearing authentication code
authentication
documents protection
E2E S2S
feature extraction
handwritten character recognition
handwritten feature extraction
Handwritten Signature
HMAC-SHA-256
Human behavior
Internet of Things
biblio
Treats based Revisiting Defences Against Password Guessing Attacks and Phishing Data Over Different Online Records
Submitted by grigby1 on Tue, 03/09/2021 - 2:38pm
Phishing of data
Human Factors
individual data
internet
Internet clients
logins attempts
message authentication
password guessing attack
password guessing attacks resistance protocol
phishing data
Human behavior
policy-based governance
problematic endeavour
pubcrawl
real page
revisiting defences
site page
standardized savings number
uncovering delicate data
word reference ambushes
Denial of Service (DoS).
authorisation
Brute force
brute force attacks
charge card number
client-server systems
Computer crime
computer network security
cookies-based solution
Cryptographic Protocols
accommodating login
dependable page
different online records
directly wide spread
failed attempts
failed login attempt
failed login tries
full-scale number
genuine customers
biblio
A distributed biometric authentication scheme based on blockchain
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
homomorphically encrypted form
wearable computers
usability
smart contracts
sensitive users
sensitive biometric data
secure authentication
Scalability
Resiliency
pubcrawl
privacy
nonencrypted form
modern computing systems
Metrics
message authentication
biometric encryption
Homomorphic encryption
enhanced usability
encryption
Distributed databases
distributed biometric authentication
Cryptography
cautious handling
blockchain
biometrics (access control)
biometric templates
biometric
authorisation
authentication
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 2:58pm
security
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
resilience
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
control systems
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
Access Control
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »