Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication protocol
biblio
Adoption of a Secure ECC-based RFID Authentication Protocol
Submitted by grigby1 on Fri, 03/17/2023 - 11:52am
Internet of Things
security
pubcrawl
resilience
Resiliency
authentication
Protocols
Wireless communication
Elliptic curve cryptography
Telecommunications
ECC
RFID
Human Factors
RFIDs
authentication protocol
Wireless attack
biblio
A Lightweight Authentication and Key Agreement Protocol for Secure Fog-to-Fog Collaboration
Submitted by grigby1 on Fri, 09/16/2022 - 3:39pm
computer architecture
collaboration
security
IoT
pubcrawl
resilience
Conferences
performance evaluation
Scalability
authentication
Protocols
Fog computing
AVISPA
Internet security
Resiliency
authentication protocol
biblio
On the Security of Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System
Submitted by grigby1 on Fri, 09/16/2022 - 3:39pm
Internet of Things
Cloud Computing
security
pubcrawl
resilience
Scalability
Medical services
Protocols
Fog computing
wireless networks
protocol
Resiliency
authentication protocol
security protocol
biblio
Formal Verification of 5G EAP-AKA Protocol
Submitted by grigby1 on Thu, 02/24/2022 - 11:31am
composability
pubcrawl
ProVerif
protocol verification
Protocols
privacy
policy-based collaboration
model checking
formal verification
Compositionality
5G EAP-AKA
Communications technology
collaboration
codes
authentication protocol
authentication
applied Pi-Calculus
Analytical models
5g network
5G mobile communication
biblio
Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
Submitted by aekwall on Mon, 12/20/2021 - 11:20am
Ad Hoc Network Security
Ad hoc networks
authentication protocol
Compositionality
Intelligent Transportation Systems
Internet of Things
Metrics
protocol
Protocols
pubcrawl
resilience
Resiliency
security
security protocol
sensors
biblio
An Enhanced SIP Authentication Protocol for Preserving User Privacy
Submitted by aekwall on Tue, 10/12/2021 - 2:06pm
security
password
privacy
Servers
authentication
Protocols
Databases
pubcrawl
composability
History
Compositionality
policy-based governance
authentication protocol
ProVerif
Session initiation protocol (SIP)
protocol verification
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by grigby1 on Fri, 06/19/2020 - 10:49am
mutual authentication
Servers
Scalability
resource-rich server authentication
Resistance
Resiliency
resilience
replay attacks
Registers
PUF-based authentication method
pubcrawl
Protocols
Policy-Governed Secure Collaboration
policy-based governance
physical unclonable function-based authentication protocol
physical unclonable function (PUF)
active deception protocol
Multiplexing
ML attack
machine learning attacks
learning (artificial intelligence)
Generators
false trust
false PUF multiplexing
Cryptographic Protocols
challenge response pairs
Buildings
binary channel
authentication protocol
authentication
authentic CRP
attack resistant deception technique
biblio
Cryptanalysis and improvement of a cloud based login and authentication protocol
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
online banking system
impersonation attack
internet
medium scale banking organization
Metrics
Mobile banking
mobile computing
multifactor authentication
Online banking
Human Factors
pubcrawl
public cloud
resilience
Resiliency
security
Servers
small scale banking organization
authentication
Human behavior
high-speed online services
Fingerprint recognition
electronic banking
e-banking services
e-banking
Cryptographic Protocols
cryptanalysis
cloud server
Cloud Computing
cloud based login
Business
bank data processing
authorisation
authentication protocol
biblio
Cookie Based Protocol to Defend Malicious Browser Extensions
Submitted by grigby1 on Fri, 04/17/2020 - 9:45am
HTTP cookie
browser extension
Chrome store
cookie management
customizing web browsers
defend malicious browser extensions
dynamic cookies
dynamic encrypted cookies
features increase
authentication protocol
offline extension installations
privileges browser extensions
replay attack
session hijacking
software module
static cookies
user interface modifications
Web Browser Security
Protocols
Servers
pubcrawl
Human behavior
Human Factors
resilience
Resiliency
authentication
internet
Cryptography
composability
online front-ends
Metrics
Browsers
Compositionality
password
user interfaces
biblio
Authentication Algorithm and Techniques Under Edge Computing in Smart Grids
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
edge computing
traditional password-based authentication
smart grid architecture
OTP algorithms
one-time password
one time password
two factor authentication
two-factor authentication
Two dimensional displays
Human Factors
authorisation
authentication protocol
security problems
Smart Grid
message authentication
smart power grids
authentication
pubcrawl
Cryptographic Protocols
Conferences
1
2
next ›
last »