Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
message authentication
biblio
A Comparative Study of Mouse and Keystroke Based Authentication
Submitted by grigby1 on Tue, 01/28/2020 - 2:35pm
keystroke analysis
pubcrawl
Presses
network security
mouse dynamics signature
Mouse Dynamics
mouse controllers (computers)
mouse based authentication
Mice
Metrics
message authentication
keystrokes elements
keystroke dynamics
keystroke based authentication
authentication
Keyboards
Human Factors
Human behavior
GUI
graphical user interfaces
Discharges (electric)
digital signatures
Cloud Computing
biometrics (access control)
biometrics
Biomedical monitoring
behavioural biometrics strategies
behavioural biometric methods
biblio
A SDN-Based Hierarchical Authentication Mechanism for IPv6 Address
Submitted by grigby1 on Tue, 01/21/2020 - 12:08pm
IPv6 source address
telecommunication network management
Switches
source address authentication
software defined networking
Software Defined Network
Servers
SDN
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
network addresses
Metrics
message authentication
access network
ipv6 security
IPv6 protocol
IP networks
Internet-connected devices
internet
hierarchical authentication mechanism
fine-grained security protection
encryption authentication
Cryptography
computer network security
computer architecture
composability
collaboration
authentication
biblio
A Flexible and Compatible Model for Supporting Assurance Level through a Central Proxy
Submitted by grigby1 on Tue, 01/21/2020 - 11:32am
Level of Assurance
user credentials
Trusted Computing
service security
Scalability
Resiliency
resilience
remote identity providers
pubcrawl
policy-based governance
NIST
Metrics
message authentication
LoA
access control decisions
Information Assurance
Human behavior
FIM
federated identity management
composability
collaboration
central proxy
authorization
authorisation
authentication and authorization infrastructure
authentication
assurance level
assurance information
biblio
Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
policy-based governance
keystroke dataset
keystroke dynamics
message authentication
Metrics
password
personally identifiable information
personally sensitive information
PII detection program
keystroke authentication research
privacy removal
pubcrawl
resilience
Resiliency
social security numbers
Task Analysis
text analysis
user authentication systems
Electronic mail
authentication
authorisation
bank card numbers
biometrics (access control)
collaboration
Continuous Authentication
conventional authentication methods
data privacy
arrays
free-text authentication algorithm
free-text keystroke authentication
Human behavior
identity theft
insider threat
Insider Threats
keystroke analysis
biblio
Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
low-end control units
telecommunication security
security issues
secret keys
Scalability
robots
robotic applications
Resiliency
pubcrawl
private key cryptography
network security
mobile robots
message authentication
automobiles
lightweight cryptography
Lightweight Ciphers
Lightweight Cipher
lightweight authentication
hardware based individual keys
Hardware
firmware
Ciphers
Autonomous Driving
Automotive engineering
Automotive Device Authentication
automotive applications
biblio
A Novel Approach on Mobile Devices Fast Authentication and Key Agreement
Submitted by aekwall on Mon, 01/13/2020 - 12:07pm
key agreement
acoustic coupling
virtual key assention
mobile device authentication
GeneWave
gadget verification
gadget inspection
Device-to-device communication
device authentication
cell phones
Acoustics
acoustic communication
encoding
security
message authentication
authentication
Databases
pubcrawl
Human behavior
Resiliency
mobile computing
data encryption
Internet of Things
Cryptography
Scalability
biblio
Secure Smart Card Signing with Time-based Digital Signature
Submitted by aekwall on Mon, 01/06/2020 - 10:37am
DER Decoder
trusted digital signing process
trusted digital signature
time-based digital signature
time stamping protocol packet
Terminal Attack
smart card terminal
sign documents
Secure Time Stamp
secure smart card signing
Pins
PIN sniffing
message alteration attack
Java Card
electronic signature
security of data
cybersecurity challenges
current smart card digital signature
smart cards
microsoft windows
digital signatures
message authentication
smart phones
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Conferences
Scalability
biblio
Lattice Based Authenticated Key Exchange with Universally Composable Security
Submitted by grigby1 on Wed, 12/11/2019 - 12:23pm
Lattices
universally composable security
universal composability
telecommunication security
small integer solution
secure channels
ring-SIS based KEM
rapid development these years
quantum computers
quantum computation
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
message authentication
authenticated channels
lattice based cryptography
key encapsulation mechanism
IoT nodes
Internet of Things
Hash functions
Encapsulation
data privacy
Cryptography
Cryptographic Protocols
composability
authenticated key exchange scheme
authenticated key exchange protocol
authenticated key exchange
biblio
On Composability of Game-Based Password Authenticated Key Exchange
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Secret key
Password Authenticated Key Exchange
PKI
practical interest
Protocols
provably secure PAKEs
pubcrawl
public key cryptography
public-key infrastructure
password
secure channels
secure composition guarantees
simulation models
standards
Symmetric Key Protocol
telecommunication security
weak forward secrecy
game-based models
Composition Theorem.
Computational modeling
Cryptographic Protocols
Cryptography
data payload encryption
find-then-guess model
FtG model
game theory
composability
game-based password authenticated key exchange protocols
game-based real-or-random definition
Games
higher-level applications
higher-level SKPs
message authentication
PAKE protocols
biblio
A Lightweight Compound Defense Framework Against Injection Attacks in IIoT
Submitted by aekwall on Mon, 12/02/2019 - 12:03pm
Switches
Smart industry
private networks
lightweight compound defense framework
lightweight authentication
injection attack event
injection attack
Industrial Internet of Things
IIoT Security
IIoT network protocols
field data
field agent
Compounds
compound approach
commands
command injection attacks
computer network security
Data Transmission
sensors
message authentication
authentication
production engineering computing
Industries
Metrics
composability
pubcrawl
Resiliency
software defined networking
Protocols
telecommunication security
Internet of Things
Cryptography
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »