Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
Remote Attestation based Software Integrity of IoT devices
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
neural style transfer
trusted solution
trusted platform modules
Trusted Computing
tpm
telecommunication security
software trusted platform module
software integrity
security issues
Scalability
Resiliency
reasonable computational power
pubcrawl
Predictive Metrics
antivirus
message authentication
IoT devices
IoT
Internet of Things
HMAC values
HMAC
hashed message authentication code
cyber-physical system security
Cryptography
Cryptographic Protocols
cryptographic operations
composability
biblio
Research on Trusted Authentication Model and Mechanism of Data Fusion
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
software engineering
Predictive Metrics
pubcrawl
Resiliency
Scalability
sensor fusion
service model
ship cluster platform
ships
neural style transfer
system design framework
system requirements
Trusted Authentication
trusted authentication model
Trusted Computing
trusted platform modules
unified authentication platform
database design
authorisation
CAS
composability
cyber-physical system security
data fusion
Data integration
Data mining
Data models
authentication
Databases
information fusion
JA-SIG CAS
marine engineering
Marine vehicles
Media
message authentication
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 11:23am
heterogeneous networked society
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
3D PAKE protocol
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
security threats
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
computer network security
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
biblio
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network
Submitted by aekwall on Mon, 11/16/2020 - 2:50pm
Resilient Security Architectures
IoT-based applications
key hierarchy
key resilience problem
message authentication
mobility management (mobile radio)
pre-authentication
pubcrawl
Resiliency
Internet of Things
secret keys
security counter-measures
security demands
security issues
security vulnerabilities
Security weakness
telecommunication security
Third Generation Partnership Project
communication entities
5G communication network
5G handover
5G handover key mechanism
5G handover security analysis
5G mobile communication
5g network
authentication
authentication complexity
3GPP
computer architecture
Fifth Generation mobile telecommunication technology
Handover
handover architecture
handover key mechanism
handover mechanism
inter-gNB handover
inter-gNB handover authentication mechanism
biblio
A Secure Identity-based Deniable Authentication Protocol for MANETs
Submitted by aekwall on Mon, 11/02/2020 - 2:40pm
mobile ad hoc networks
manet privacy
secure identity-based deniable authentication protocol
identity-based cryptosystem
identity-based cryptography
IBDA protocol
heavy computational communication overhead
Deniable authentication
Bilinear Pairing
adequate security
mobile nodes
Compositionality
mobile devices
elliptic curve
mobile ad hoc network
mobile computing
Cryptography
MANET
Elliptic curves
Elliptic curve cryptography
public key cryptography
mobile radio
Ad hoc networks
message authentication
authentication
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
biblio
Inclusive Security Models To Building E-Government Trust
Submitted by grigby1 on Fri, 10/16/2020 - 11:14am
nonrepudiation properties
trusted security solution
Trusted Computing
trust of government
trust
security threats
security requirements
security perspective
Resiliency
resilience
pubcrawl
Privacy Requirements
privacy relationships
privacy properties
privacy
policy-based governance
Access Control
message authentication
internet
inclusive security model
inclusive security
Human behavior
government data processing
e-government trust
E-Government
e-gov
data privacy
Cybersecurity
collaboration
authorization
authorisation
authentication
biblio
Building PUF Based Authentication and Key Exchange Protocol for IoT Without Explicit CRPs in Verifier Database
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
secret challenge-response pair
identity based encryption
Intel Edison board
IoT node
IP-spoofing
key exchange protocol
Keyed hash function
password dependency
protocol resists
PUF based authentication
Digilent Nexys-4 FPGA board
secured video surveillance camera
Session Key Security
stand-alone video camera
standard network penetration tools
traditional authentication protocols
universal composability framework
verifier database
composability
physically unclonable functions
Internet of Things
Hardware
Cryptographic Protocols
Protocols
pubcrawl
Databases
authentication
message authentication
encryption
Elliptic curve cryptography
Cameras
device authentication
man-in-the-middle attack
IoT infrastructure
pufs
key management
Artix-7 FPGA
biblio
Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
internet
streaming bots attack
Streaming bots
Servers
security attacks
security attack
screenlogger
replay attack
pubcrawl
phishing attack
password-guessing attack
password
one time password
message authentication
keylogger
authentication
Intelligent captcha technique
Intelligent Authentication Scheme
Human behavior
hardware-independent Authentication Scheme
Hardware
denial of service
Cryptography
Cryptographic Protocols
computer network security
Computer crime
composability
Cloud Computing
captchas
CAPTCHA
biblio
Authentication Model using the Bundled CAPTCHA OTP Instead of Traditional Password
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
Electronic mail
CAPTCHA
unique random parameter
traditional password
one time password
identity verification
e-mail
captchas
CAPTCHA OTP
Bundled CAPTCHA OTP
authentication model
authorisation
password
composability
Computational modeling
authentication
telecommunication security
message authentication
Human behavior
pubcrawl
Servers
biblio
Strong Password Generation Based On User Inputs
Submitted by grigby1 on Fri, 09/04/2020 - 3:38pm
popular online password checkers
generated passwords
intricate password patterns
non crackable passwords
password authentication system
password cracking
password cracking attacks
Password entropy
Password generator
existing random password generators
produced passwords
Randomization technique
special characters
Strength checkers
strong password generation
Strong password pattern
brute force attacks
Brute Force Attack
data privacy
internet
message authentication
pubcrawl
Human Factors
policy-based governance
password security
user interfaces
authorisation
authentication systems
authenticity
Auto-generated
Case sensitive words
Combination of numbers
dictionary attack
electronic commerce
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »