Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
SDKEY-based transparent encryption storage
PIN
prototype system
public key cryptography
public key exchange
Receivers
SDKEY
SDKEY device
SDKEY-based secure storage
message authentication
secure computation environment
sensitive data leakage
smart phones
storage management
system boot
transmission approach
zero-key exchange
encryption
Android phones
Android system
authentication
Ciphers
data files
Data protection
decryption operation
dual-authentication scheme
Android (operating system)
encryption operation
Encryption Storage
encryption transmission
fine-grained encryption scheme
Key exchange
key exchange mechanisms
lock screen
biblio
Development of a keyboardless social networking website for visually impaired: SocialWeb
Submitted by BrandonB on Mon, 05/04/2015 - 11:33am
message authentication
Web Speech API
visually impaired people
user friendliness
STT conversion
speech to text conversion technologies
Speech recognition
Speech
SocialWeb
social networking (online)
Social network services
screen readers
screen reader
Acoustic Fingerprinting
Media
malicious attackers
keyboardless social networking Website
human computer interaction
handicapped aids
Fingerprint recognition
Computers
computer proficiency
Communities
Audio fingerprinting
Assitive technologies
assistive technologies
biblio
A trusted measurement scheme suitable for the clients in the trusted network
Submitted by BrandonB on Thu, 04/30/2015 - 2:21pm
network security threat
trusted network connection
trusted network
trusted measurement scheme
trusted computing field
Trusted Computing
trust measurement scheme
static measurement
state measurement
real-time systems
real-time state measurement
real-time measurement support
real-time measurement
polynomials
access control technology
message authentication
identity privacy
Gold
fine-grained states
fine-grained security policy
fine granularity
dynamic measurement
data privacy
Complexity theory
authorisation
authentication mechanism
authentication
Area measurement
biblio
Identifying users with application-specific command streams
Submitted by BrandonB on Thu, 04/30/2015 - 1:52pm
receiver operating characteristic
machine learning
machine learning algorithms
message authentication
Mice
Microsoft
MS Word commands
Radio frequency
random forests
learning (artificial intelligence)
RF
ROC curve
sensitivity analysis
user command streams
user identification
user profiles
user-issued commands
Active Authentication
Keyboards
Intrusion Detection
Human-computer interaction
human computer interaction
Hidden Markov models
GUI-based application
Classification algorithms
biometrics (access control)
Behavioral biometrics
authentication
AUC
area under the curve
application-specific command streams
AdaBoost
active authentication model
« first
‹ previous
…
10
11
12
13
14
15
16
17
18