Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
Secure Protocol for Subscriber Identity Module
Submitted by grigby1 on Mon, 03/05/2018 - 1:14pm
SIM
Protocols
pubcrawl
Ransomware
resilience
Resiliency
secure protocol
service provider
short messaging service
Poles and towers
social engineering
stolen SIM
subscriber Identity Module
user contacts
user credentials
user sensitive information
VLR
HLR
authorisation
banking information
Carrier
composability
current SIM model
data privacy
ECC
Elliptic curve cryptography
authentication
IMSI
internet
message authentication
Metrics
Mobile communication
Mobile handsets
modern mobile communication
biblio
Vehicle Network Security Testing
Submitted by grigby1 on Mon, 03/05/2018 - 1:06pm
testing
Patterns
Payloads
Protocols
pubcrawl
resilience
Resiliency
security
security loophole
pattern decoding
V2V
V2V V2X loopholes
V2X
vehicle
vehicle network security testing
vehicular ad hoc networks
white box approach
White Box Encryption
gateway module security testing
black box approach
CAN
Communication networks
composability
computer network security
diagnostics security
ECU
Ethernet
authentication
gateway security
grey box approach
in-vehicle network security implementation
in-vehicle networks
internetworking
message authentication
Metrics
Network
biblio
Forensic Attribution in NoSQL Databases
Submitted by grigby1 on Mon, 03/05/2018 - 1:03pm
message authentication
survey
Structured Query Language
sensitive information
security of data
Security by Default
Scalability
pubcrawl
policy-based governance
Peer-to-peer computing
NoSQL databases
NoSQL
Access Control
Human Factors
Human behavior
Forensics
forensic attribution
database forensics
collaboration
cloud implementations
Cloud Computing
authorisation
authentication
attribute-based encryption
biblio
Users' Identification through Keystroke Dynamics Based on Vibration Parameters and Keyboard Pressure
Submitted by grigby1 on Tue, 02/27/2018 - 2:39pm
sensors
keystroke dynamics
message authentication
Metrics
multilayer perceptrons
perceptron algorithms
probability density
pubcrawl
quadratic form networks
keystroke analysis
special sensors
time characteristics
Time-frequency Analysis
unauthorized access
user identification
vibration parameters
Vibrations
wide artificial neural networks
error probabilities
Bayes methods
Bayes rule
biometrics (access control)
complementary parameters
Correlation
correlation between biometrie attributes
Data protection
dynamics
authorisation
error statistics
Human behavior
Human Factors
keyboard pressure parameters
keyboard vibration
Keyboards
Keys pressure
biblio
Language Dependent Challenge-Based Keystroke Dynamics
Submitted by grigby1 on Tue, 02/27/2018 - 2:38pm
pubcrawl
Metrics
native language backgrounds
native language speakers
native Telugu speakers
natural language processing
nonnative impostor users
Password authentication
Pressing
message authentication
rhythm
Slovak words
Spanish words
typing behaviour
typing rhythm
unobtrusive method
word processing
Writing
foreign language
authorisation
challenge-based KD system
common English words
data analysis
Databases
English challenge-based system
feature extraction
FMR
authentication
Human behavior
Human Factors
keystroke analysis
keystroke dynamic system
language dependent challenge-based keystroke dynamics
language dependent words
Measurement
biblio
A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
replay-attack prevention
multi-receiver encryption
mutual authentication
pairing operations
performance evaluations
private key cryptography
pubcrawl
Public key
public key cryptography
Receivers
Metrics
resilience
Resiliency
Scalability
Schnorr
Schnorr-like lightweight identity-based partial private keys
sensitive personal data disclosure prevention
source authentication
Trusted Computing
trusted third party
encryption
android encryption
authentication
decryption
device to device communications
device-generated public keys
disclosure range control
Elliptic curves
embedded Android devices
embedded systems
Android (operating system)
Human behavior
Human Factors
implicit user authentication
Internet of Things
IoT (Internet of Things)
IoT applications
lightweight multireceiver encryption
message authentication
message integrity
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
biblio
NFC Unlock: Secure Two-Factor Computer Authentication Using NFC
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
record keeping
Near Field Communication technology
near-field communication
NFC
NFC authentication
NFC unlock
passcode
pGina
pubcrawl
Near Field Communication
resilience
Resiliency
secure multifactor authentication system
SMS code
standard Windows credentials
telecommunication computing
text alerts
two-factor computer authentication
human factor
authentication
authorisation
Cryptography
C\#
C\# language
C\# languages
encryption
Human behavior
advanced encryption standard
Human Factors
login attempts
message authentication
Metrics
mobile computing
multifactor authentication
Multiple-factor Authentication
biblio
A multifactor authentication system using secret splitting in the perspective of Cloud of Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
message authentication
virtualized control
smart cards
Servers
Security analysis
secret splitting
Resiliency
resilience
pubcrawl
multifactor authentication system
multifactor authentication
Metrics
authentication
IoT
Internet of Things
Human Factors
human factor
Human behavior
encryption algorithms
Diffie-Hellman key exchange algorithm
Cryptography
CoT
Cloud of Things
Cloud Computing
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »