Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
Certificateless Aggregate Message Authentication for Hierarchical Trusted Authority based VANET
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
key escrow problem
certificateless aggregate signature scheme
certificateless public key cryptography
digital signature schemes
hierarchical organization
hierarchical trusted authority based VANET
hierarchical trusted authority privacy
high vehicle density scenarios
identity based cryptography
certificateless aggregate message authentication
message forgeability attack
multiple trusted authorities
neighboring vehicles
OBU device
side channel attacks
traditional PKC concept
Repudiation
digital signatures
telecommunication security
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
Metrics
message authentication
data privacy
public key cryptography
VANET
RSU
Aggregate Signature
aggregate verification
beacon messages
certificate management overhead
biblio
Enhanced Lightweight Cloud-assisted Mutual Authentication Scheme for Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
tools
wearables security
Wearable devices
wearable computers
symmetric cryptography
secure authentication process
lightweight cloud-assisted mutual authentication scheme
IoT authentication
cloud-assisted authentication scheme
Authentication Protocols
Wireless fidelity
IoT security
public key cryptography
message authentication
authentication
security
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
Protocols
Cryptographic Protocols
telecommunication security
data privacy
Servers
Scalability
Cloud Computing
IoT
biblio
Research on End-to-End Security Authentication Protocol of NB-IoT for Smart Grid Based on Physical Unclonable Function
Submitted by aekwall on Mon, 02/17/2020 - 2:17pm
domestic cryptographic algorithm
smart power utilization
SM3
self-controllable NB-IoT application layer security architecture
security authentication protocol
secure data transmission
power network data transmission
power grid business platforms
Physical Unclonable Function
NB-IoT terminals
national strategic hot spot
narrow band internet of things
end-to-end security authentication protocol
electric power business
Scalability
end-to-end security
encryption keys
power engineering computing
Smart Grid
smart grid security
message authentication
smart power grids
Metrics
privacy
pubcrawl
Resiliency
Cryptographic Protocols
Internet of Things
biblio
An efficient multi-factor authenticated key exchange with physically unclonable function
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
password
two factor authentication
Servers
secure PUF-MAKE protocol
secure physically unclonable function
Resiliency
PUF-MAKE setting
PUF-embedded device
PUF
pubcrawl
Protocols
authentication
multifactor authenticators
multifactor authentication
multifactor authenticated key exchange
Multi-factor authenticators
Metrics
message authentication
Key exchange
Human Factors
encryption
Cryptographic Protocols
biblio
Securing HPC using Federated Authentication
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
PKI
the U.S. Government PKI
multifactor authentication process
Multi-factor authentication
In Common Federation
HPC system security
federated identity management
federated authentication
external federated identity management systems
basic account maintenance
multifactor authentication
US Department of Defense
public key infrastructure
authorisation
Portals
Human Factors
parallel processing
High performance computing
message authentication
authentication
metadata
Metrics
pubcrawl
Resiliency
learning (artificial intelligence)
security
biblio
Multi-Factor Authentication Modeling
Submitted by aekwall on Mon, 02/10/2020 - 12:02pm
multifactor authentication
risk-based authentication
risk management
Resiliency
pubcrawl
patents
password
omnifactor authentication
multiple authentication factors
multifactor authentication modeling
acceptable authentication methods
Metrics
message authentication
knowledge based systems
Human Factors
fraud detection system
Fingerprint recognition
digital fingerprint
authorisation
authentication
biblio
An Efficient Two-Server Password-Only User Authentication for Consumer Electronic Devices
Submitted by grigby1 on Mon, 02/10/2020 - 11:31am
Protocols
two-server password-only remote user authentication protocol
trust model
telecommunication security
SSL Trust Models
SSL
Smartphones
Servers
secure socket layer protocol
Scalability
Resiliency
resilience
pubcrawl
authentication
password
Metrics
message authentication
laptops
impersonation attacks
Human Factors
Human behavior
dictionary attacks
Dictionaries
Cryptographic Protocols
Consumer electronics
consumer electronic devices
biblio
Spam Domain Detection Method Using Active DNS Data and E-Mail Reception Log
Submitted by grigby1 on Mon, 02/10/2020 - 11:17am
Metrics
unsolicited e-mail
Training
system monitoring
supervised learning
spoofed e-mails
SPF
spam mail
spam domain detection
spam detection
sender IP address
sender domain authentication
Scalability
pubcrawl
Postal services
active DNS
message authentication
IP networks
internet
Human Factors
Human behavior
feature extraction
Electronic mail
e-mail reception log
e-mail log analysis
DMARC
DKIM
authentication
active DNS data
biblio
Keystroke Analysis for User Identification Using Deep Neural Networks
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
malicious users
user identification
typing style
typing dynamics
supervised learning
pubcrawl
pattern classification
neural network
neural net architecture
multilayer perceptrons
MLP deep neural network
Metrics
message authentication
Artificial Intelligence
learning (artificial intelligence)
keystroke analysis
keystroke
Human Factors
Human behavior
feature model
deep neural network architecture
deep learning-based classifiers
deep learning
decision-trees machine learning algorithm
Decision trees
authentication systems
biblio
Keystroke Dynamics Using Auto Encoders
Submitted by grigby1 on Tue, 01/28/2020 - 2:35pm
Human Factors
Training
timing
stolen credentials
risk based approach
pubcrawl
password
Metrics
message authentication
machine learning
learning (artificial intelligence)
Keystrokes Dynamics
keystroke dynamics
keystroke analysis
individual user
anomalous typing patterns
Human behavior
Heuristic algorithms
fraud
feature extraction
dynamic flags
digital signatures
digital signature
Cyber Attacks
credential based authentication systems
biometrics (access control)
autoencoders
authorisation
authentication
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »