Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user authentication
biblio
Authenticate Users with Their Work on the Internet
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
message authentication
Web pages
user authentication
secret password
Resiliency
resilience
remote information systems
remote access
pubcrawl
password
multifactor authentication
Metrics
authentication
Internet user
internet
Human Factors
Human behavior
History
Document Object Model
classification of text documents
Browsers
authorization
authorisation
biblio
Enterprise WiFi Hotspot Authentication with Hybrid Encryption on NFC- Enabled Smartphones
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
smartphone
NFC- enabled smartphones
personally owned devices
pubcrawl
resilience
Resiliency
resources access
Servers
smart phones
network security
user authentication
Wi-Fi network
Wireless fidelity
wireless LAN
wireless local area network
WPA2 Enterprise
WPA2-802.1X model
authentication
Near Field Communication
multifactor authentication
Multi-factor authentication
Metrics
hybrid encryption
hybrid cryptosystem
Human Factors
Human behavior
Enterprise WiFi hotspot authentication
enterprise Wi-Fi hotspot authentication
encryption
Cryptography
connectivity
company information
business data transmission
biblio
SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
mobility conditions
ACO
ad hoc network
ant colony optimisation
Ant colony optimization
guaranteed QoS performance
Malicious Attacker
malicious attackers
MANET open nature network
MANET routing protocols
mobile nodes
opportunistic routing protocol
QoS aware protocol
QoS improvement algorithm
RSSI measurements
Secure-QMAA
security Algorithm
security-QoS mobility aware ACO routing protocol
SQMAA
RSSI
authorisation
Data Security
telecommunication security
security
network security
Resiliency
pubcrawl
Routing protocols
Routing
Scalability
Swarm Intelligence
quality of service
secure communication
mobile ad hoc networks
Blackhole attack
mobility management (mobile radio)
DoS attacks
user authentication
biblio
Extending Authentication Mechanism to Cooperate with Accountable Address Assignment
Submitted by grigby1 on Fri, 05/22/2020 - 1:13pm
IPv6
wireless networks
user authentication
Source Address Validation Improvement
security problems
SAVI
Resiliency
resilience
pubcrawl
Protocols
privacy
Portals
network accountability
Metrics
message authentication
main identity authentication mechanism
802.1X
IP source addresses
IP networks
IP addresses
internet
effective accountability mechanisms
DHCP request process
computer network security
composability
CAIP
authentication
accounting ability
Accountable IP address assignment
Accountable IP
accountable identity
accountable address assignment
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 9:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
face recognition
two factor authentication
web authentication methods
user authentication
single-factor authentication
secure authentication
Digital Multifactor authentication
Cyber Physical System
two-factor authentication
multifactor authentication
Multi-factor authentication
Servers
Human Factors
Fingerprint recognition
sensors
password
message authentication
authentication
Cryptography
pubcrawl
cyber-physical systems
authorisation
biblio
Keystroke Based User Authentication Using Modified Differential Evolution
Submitted by grigby1 on Tue, 01/28/2020 - 1:36pm
Anomaly Detection
authentication
Human behavior
Human Factors
keystroke analysis
keystroke dynamics
Metrics
Modified Differential Evolution
password
Presses
pubcrawl
Subspace Anomaly Detection
Task Analysis
timing
Training
user authentication
biblio
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System
Submitted by grigby1 on Tue, 01/21/2020 - 10:35am
3G mobile communication
user authentication
unitary authentication model
telecommunication security
security levels
Scalability
resilience
quality of service
pubcrawl
multiservice system
multimedia interaction
mobility management (mobile radio)
mobile industry automation
late-model services
Internet of Vehicles
Identity management
identity authentication methods
3GPP committee
5G mobile communication
5G multiservice systems
5G network platform
composable three-factor authentication mechanism
Cryptographic Protocols
differentiated services
diversified identity authentication mechanism
diversified identity management
diversified security requirements
extensible authentication protocol
future fifth-generation mobile communications system
high definition visual communication
Human behavior
biblio
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
Submitted by grigby1 on Tue, 11/26/2019 - 2:34pm
multiple pattern scheme
user authentication
Usable Security
usability
statistical analysis
Sensitivity
sensitive applications
Scalability
Resiliency
resilience
pubcrawl
progressive authentication
Pins
pattern locks
pattern lock
password
access levels
multiple level pattern
mobile computing
message authentication
median unlock times
low-security applications
Human Factors
human factor
Human behavior
higher-complexity pattern
graphical passwords
geriatrics
generic applications
consecutive user survey
authentication
Android pattern lock
biblio
Using Keystroke Authentication Typing Errors Pattern as Non-Repudiation in Computing Forensics
Submitted by grigby1 on Tue, 10/15/2019 - 1:44pm
biometric
composability
computer security
Forensics
Human behavior
keystroke
Metrics
Pattern recognition
pubcrawl
Repudiation
resilience
Resiliency
user authentication
« first
‹ previous
1
2
3
4
next ›
last »