Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
multiple pattern scheme
user authentication
Usable Security
usability
statistical analysis
Sensitivity
sensitive applications
Scalability
Resiliency
resilience
pubcrawl
progressive authentication
Pins
pattern locks
pattern lock
password
access levels
multiple level pattern
mobile computing
message authentication
median unlock times
low-security applications
Human Factors
human factor
Human behavior
higher-complexity pattern
graphical passwords
geriatrics
generic applications
consecutive user survey
authentication
Android pattern lock
biblio
RDI: Real Digital Identity Based on Decentralized PKI
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
Brute-force Attack
PKI Trust Models
username-password approach
trusted source certificate authorities
Real Digital Identity based approach
RDI
public key binding
public key approach
point of trust attack
online transactions
Online banking
Internet banking applications
Digital identity
decentralized PKI scheme
decentralized PKI
automobiles
Registers
public key cryptography
Public key
smart contracts
message authentication
smart contract
blockchain
Metrics
pubcrawl
Human behavior
Resiliency
authorisation
Scalability
biblio
BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs
Submitted by aekwall on Mon, 11/18/2019 - 11:49am
privacy preservation
vehicular ad-hoc networks
vehicular ad hoc networks
VANET
Trust management
telecommunication security
security services
Scalability
revocation transparency
Resiliency
reputation system
public key infrastructure
public key cryptography
Public key
pubcrawl
privacy protection
authentication protocol
privacy
PKI Trust Models
Metrics
message authentication
internal vehicles
Human behavior
forged message broadcasting
distributed trust management
data privacy
Data models
Cryptographic Protocols
blockchain-based anonymous reputation system
blockchain
Bars
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
biblio
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Submitted by aekwall on Mon, 09/23/2019 - 10:25am
Predictive Metrics
wireless sensor networks
user impersonation attack
user anonymity
telecommunication security
sensor network characteristics
secure communication
Resiliency
pubcrawl
provable user authentication scheme
provable security
Protocols
privacy-preserving user authentication protocol
privacy-preserving cryptanalysis
authentication
password change phase
password
mobile devices
message authentication
Logic gates
key agreement
Internet of Things security
Internet of Things
Elliptic curves
Elliptic curve cryptography
data privacy
Cryptographic Protocols
Compositionality
biblio
Performance evaluation of an authentication mechanism in time-triggered networked control systems
Submitted by willirn1 on Fri, 05/31/2019 - 11:18am
networked control systems
Vanderbilt
TTEthernet network
TTEthernet
timing behavior
time-triggered networked control systems
Time-Trigger Architectures
time triggered architectures
Synchronization
Switches
security mechanisms
Secure Messages
safety property
reliability property
Receivers
performance evaluation
System-security co-design
network data communication
message integrity
message confidentiality
message authentication
Local area networks
HMAC
hash based message authentication
fault tolerance property
Cryptography
computer network security
computation overhead
communication overhead
authorisation
authentication mechanism
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication
biblio
TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
security
Human behavior
Kerberos
Kerberos biometric blowfish user authentication
message authentication
Metrics
pubcrawl
Registration
Resiliency
secured data access
genuine user
Servers
Ticket Granting
tiger hash
Tiger Hash-based Kerberos biometric blowfish authentication
unauthorized users
user ID
user identity
users ID
cloud server
authenticated user
authentication
authentication accuracy
authentication server
authentications time
authenticity
authorisation
Blowfish encryption
Cloud Computing
Access Control
cloud services
cloud user
confidentiality rate
Cryptography
CS grants
CU
encrypted ticket
encryption
biblio
Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices
Submitted by aekwall on Mon, 05/20/2019 - 10:02am
local networks
transmission protocol
Symmetric Key Cryptography
secure data transmission
Resiliency
public key cryptography
pubcrawl
Protocols
node-to-node secure data transmission protocol
Node to node data transmission
Metrics
message authentication
low-power IoT devices
low-power devices
authentication
Kerberos
IoT devices exchange data
IoT
Internet of Things
internet
Human behavior
encryption
decryption
data communication
Cryptographic Protocols
computer network security
authorisation
biblio
Mathematical Modeling of Group Authentication Based on Isogeny of Elliptic Curves
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
message authentication
Task Analysis
Scalability
Resiliency
quantum computing
public key cryptography
pubcrawl
Protocols
postquantum systems
Metrics
authentication
mathematical modeling
isogeny graphs
Isogeny
hierarchical group authentication scheme
graph theory
Elliptic curves
Elliptic curve cryptography
Complexity theory
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »