Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
Email-Based Password Recovery - Risking or Rescuing Users?
Submitted by grigby1 on Thu, 02/14/2019 - 11:22am
resilience
Web sites
web services
user instructions
user authentication
usability
Unsolicited electronic mail
telecommunication security
System recovery
shared secret
security problem
secret passwords
secret link
Resiliency
authentication
pubcrawl
password recovery email
password recovery
password
message authentication
entire user-website relationship
English language websites
email-based password recovery
email content
Electronic mail
content issues
content and design of email-based password recovery
authorisation
biblio
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
Submitted by grigby1 on Fri, 02/08/2019 - 4:35pm
smart meter
nonlight-weight protocol
portable access
pubcrawl
public key cryptography
Security analysis
smart cards
Smart Grid
smart grid technology
mobile computing
smart power grids
subsequent communication
telecommunication security
two factor authentication
two-factor lightweight user authentication scheme
two-factor user authentication
user anonymity
anonymous and untraceability
message authentication
Lightweight Encryption
lightweight anonymous mobile user authentication scheme
Human Factors
Human behavior
electric vehicle
data privacy
Cryptographic Protocols
critical security
communication process
cloud server
charging process
biometric encryption
authorisation
authentication process
biblio
Context-Aware Authorization and Anonymous Authentication in Wireless Body Area Networks
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
Scalability
Internet of Things
message authentication
mobile radio
privacy
pubcrawl
Public key
resilience
Resiliency
identity-based broadcast signcryption
telecommunication control
ubiquitous computing
ubiquitous healthcare system
WBAN
Wireless body area networks
Wireless communication
Wireless communications
context-aware access control
adaptive access control scheme
adaptive contextual privacy
anonymous authentication approach
anonymous messaging
authentication
authorisation
body area networks
ciphertext authenticity
Access Control
context-aware authorization
context-aware privacy
Cryptography
data privacy
health care
healthcare services
hybrid certificateless signcryption
biblio
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
road safety
private information
Protocols
pseudonym-varying scheduling
pubcrawl
real-time systems
Receivers
resilience
Resiliency
privacy properties
Scalability
secure authentication algorithm
Security Properties
spatial-temporal messages
Spatial-Temporal Trust mechanism
Symmetric-Key Cryptography
Trusted Computing
anonymous messaging
privacy
message authentication
malicious cars
Intelligent Transportation Systems
Intelligent Transportation System
FastTrust
Fast and Anonymous Spatial-Temporal Trust
Expressways
entropy-based commitment
data privacy
Cryptography
connected cars
automobiles
authorisation
authentication
biblio
On the Security of an Efficient Anonymous Authentication with Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Networks
Submitted by grigby1 on Thu, 01/31/2019 - 12:21pm
privacy preserving
vehicular ad hoc networks (VANETs)
vehicular ad hoc networks
VANET
Trusted Authority range
security requirements
security
Scalability
Resiliency
resilience
replay attack
Receivers
Public key
pubcrawl
Protocols
anonymity
message modification attack
message authentication
impersonation attack
high computational communication overhead
Electrical Engineering
EAAP protocol
Cryptographic Protocols
conditional privacy-preserving scheme
computational overhead
authorisation
authentication protocol
authentication
anonymous messaging
anonymous authentication scheme
biblio
A Robust Anonymity Preserving Authentication Protocol for IoT Devices
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
message authentication
telecommunication security
Servers
security mechanisms
robust anonymity preserving authentication protocol
Resiliency
resilience
radiofrequency identification
public key cryptography
pubcrawl
Protocols
privacy
online threat
Metrics
anonymity
lightweight authentication
IoT devices
Internet of Things
Human Factors
Human behavior
Generators
efficient public key cryptography mechanism
ECC
data privacy
Cryptographic Protocols
composability
authentication
biblio
LipPass: Lip Reading-based User Authentication on Smartphones Leveraging Acoustic Signals
Submitted by grigby1 on Mon, 01/21/2019 - 12:28pm
privacy protection
learning (artificial intelligence)
lip movement patterns
lip reading-based user authentication system
LipPass
Lips
message authentication
mobile computing
pattern classification
Human behavior
pubcrawl
replay attacks
Resiliency
smart phones
Smartphones
spoofer detectors
support vector machine
Support vector machines
biometric-based authentication
Acoustic signal processing
acoustic signals
Acoustics
audio signal processing
authentication
authorisation
binary classifiers
binary tree-based authentication
Acoustic Fingerprints
build-in audio devices
composability
Data protection
deep learning-based method
Doppler effect
Doppler profiles
feature extraction
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
Detection and Prevention of Routing Attacks in Internet of Things
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
MatLab simulation
Trusted Computing
smart objects
smart network
Sinkhole
Selective Forwarding
security
RPL
routing attack prevention
routing attack detection
Routing attack
Routing
Resiliency
pubcrawl
Protocols
message authentication
6LoWPAN
Key Match Algorithm
IoT based network
Intrusion Detection System (IDS)
intrusion detection system
Intrusion Detection
Internet of Things
internet
encryption techniques
Cryptography
composability
Clustering algorithms
Cluster-Based Algorithm
CBA algorithm
authentication techniques
biblio
Context Aware Ubiquitous Biometrics in Edge of Military Things
Submitted by grigby1 on Mon, 12/10/2018 - 11:33am
operational context data collection
Internet of Things
iobt
IoMT
message authentication
military computing
military equipment
military personnel
military-battlefield applications
internet of military/battlefield things
pubcrawl
resilience
Resiliency
Scalability
soldier psychophysical condition continuous monitoring
static biometrics
ubiquitous computing
ubiquitous sensing
context-adaptive authentication
battlefield-level biometric monitoring
biometrics (access control)
Cloud Computing
computer architecture
computing devices
Conferences
context aware biometrics
context aware ubiquitous biometrics
authentication
Context-aware services
dedicated edge computing architecture
distributed processing
dynamic biometrics
edge of military things
Human Factors
Internet of battlefield things
Internet of military Things
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »