Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
Countermeasure of Lightweight Physical Unclonable Function Against Side-Channel Attack
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
message authentication
Training data
Tamper resistance
side-channel information
Side-channel attack
security of IoT
Scalability
pubcrawl
Power measurement
Power demand
power consumption
power aware computing
Physical Unclonable Function
modeling attack
Metrics
authentication
lightweight PUF
lightweight physical unclonable function
Internet of Things
internet
Integrated circuit modeling
Industrial Internet of Things
Human Factors
Human behavior
Hardware Security
field programmable gate arrays
external Internet
Cryptography
countermeasure method
biblio
A New Three Party Authenticated Key Agreement Protocol Which Is Defiant towards Password Guessing Attack
Submitted by grigby1 on Mon, 03/02/2020 - 1:32pm
Servers
Password authentication
Password Guessing Attacks
password related attacks
private key cryptography
protocol vulnerable
Protocols
pubcrawl
Scalability
password
side channel attacks
Smart card
smart cards
Tamper resistance
tampered resistance property
telecommunication security
transaction secret values
accurate guess
off-line password guessing attack
new three party authenticated key agreement protocol
Metrics
message authentication
lost smart card
key agreement protocol
insecure channel
Human Factors
Human behavior
encryption
Cryptographic Protocols
cryptographic key agreement protocol
common session secret key
Bio-Hash
authentication
biblio
Authentication Algorithm and Techniques Under Edge Computing in Smart Grids
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
edge computing
traditional password-based authentication
smart grid architecture
OTP algorithms
one-time password
one time password
two factor authentication
two-factor authentication
Two dimensional displays
Human Factors
authorisation
authentication protocol
security problems
Smart Grid
message authentication
smart power grids
authentication
pubcrawl
Cryptographic Protocols
Conferences
biblio
Authentication Protocols Based on One-Time Passwords
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
cryptographic algorithms
reviewed protocols
Resistance
relatively old Lamport's hash-chain protocol
one-time passwords
one-time password
information technologies
e-commerce
complicated protocols
two factor authentication
two-factor authentication
Authentication Protocols
electronic commerce
Servers
protocol
Human Factors
Phishing
Fingerprint recognition
authentication
message authentication
Vulnerability
Cryptography
pubcrawl
information security
Cryptographic Protocols
biblio
Don't Punish all of us: Measuring User Attitudes about Two-Factor Authentication
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
2FA methods
user sentiment
user attitude measurement
Usable Security
sentiment analysis
remote attacker
Remember Me setting
Duo 2FA
Brigham Young University
security
two factor authentication
two-factor authentication
password
Human Factors
message authentication
usability
pubcrawl
authorisation
biblio
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
Virtual private networks
virtual private networks connections
trustless two-factor authentication
server authentication
security component
secure web service
secure shell protocol
OpenSSH server
blockchain platform
authentication systems
authentication request
authentication purpose
two factor authentication
secret information
Human Factors
security of data
blockchain technology
password
smart contracts
message authentication
authentication
web services
internet
blockchain
bitcoin
pubcrawl
Trusted Party
Cryptographic Protocols
telecommunication security
Servers
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
face recognition
two factor authentication
web authentication methods
user authentication
single-factor authentication
secure authentication
Digital Multifactor authentication
Cyber Physical System
two-factor authentication
multifactor authentication
Multi-factor authentication
Servers
Human Factors
Fingerprint recognition
sensors
password
message authentication
authentication
Cryptography
pubcrawl
cyber-physical systems
authorisation
biblio
Two-factor authentication framework for private cloud
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
frequently used solution
two factor authentication
Web authentication form
unique code
two-factor authentication framework
two-factor authentication
TOTP user
TOTP authentication forms
TOTP
TFA
simple user authentication
public cloud
private cloud solutions
private cloud
Password authentication
OpenStack cloud
security
cloud providers
banking Websites
authentication module
additional field
Human Factors
password
message authentication
authentication
social networking (online)
Mobile handsets
Google
pubcrawl
Software
authorisation
Cloud Computing
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »