Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user authentication
biblio
Vulnerability Analysis of Secure USB: Based on the Fingerprint Authentication of Product B
Submitted by grigby1 on Fri, 03/22/2019 - 11:36am
biometric authentication
biometric encryption
Metrics
pubcrawl
resilience
Resiliency
Scalability
secure USB
user authentication
Vulnerability Analysis
biblio
Email-Based Password Recovery - Risking or Rescuing Users?
Submitted by grigby1 on Thu, 02/14/2019 - 10:22am
resilience
Web sites
web services
user instructions
user authentication
usability
Unsolicited electronic mail
telecommunication security
System recovery
shared secret
security problem
secret passwords
secret link
Resiliency
authentication
pubcrawl
password recovery email
password recovery
password
message authentication
entire user-website relationship
English language websites
email-based password recovery
email content
Electronic mail
content issues
content and design of email-based password recovery
authorisation
biblio
VibWrite: Towards Finger-input Authentication on Ubiquitous Surfaces via Physical Vibration
Submitted by grigby1 on Thu, 06/07/2018 - 1:58pm
finger-input
Human behavior
pattern locks
physical vibration
pubcrawl
resilience
Resiliency
Scalability
ubiquitous surfaces
user authentication
biblio
Accumulators with Applications to Anonymity-Preserving Revocation
Submitted by grigby1 on Mon, 04/02/2018 - 11:31am
Human behavior
zero-knowledge proofs
user authentication
Theorem Proving
RSA-based dynamic accumulator
revocation functionality
revocation
Resiliency
resilience
public key cryptography
pubcrawl
Plugs
optimal communication complexity
Metrics
message authentication
membership revocation
accumulators
Heuristic algorithms
Cryptography
cryptographic applications
composability
Complexity theory
communication complexity
Braavos construction
authentication
ARC
anonymous revocation component
anonymous credentials
anonymous credential systems
anonymity-preserving revocation
anonymity
Additives
biblio
Generating Look-alike Names For Security Challenges
Submitted by grigby1 on Thu, 02/15/2018 - 10:39am
resilience
privacy
Artificial Intelligence
pubcrawl
Resiliency
Human behavior
Scalability
user authentication
human factor
Human Factors
name embeddings
security challenges
AI
biblio
A policy-based identity management schema for managing accesses in clouds
Submitted by grigby1 on Tue, 01/23/2018 - 2:45pm
Access Control
authentication
Cloud Computing
Computational modeling
Identity management
Policy
Policy Mapping
pubcrawl
Reliability
Scalability
scalable
Scalable Security
security
Servers
user authentication
biblio
A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications
Submitted by grigby1 on Tue, 01/23/2018 - 2:28pm
policy-based governance
Mobile Application
mobile computing
PAM component
PMG component
Policy
Policy Activity Monitor component
Policy Based Governance
Policy Match Gate component
Policy Proxy DB
Policy Validation Unit
Logic gates
PPDB
protected cloud SaaS resources
pubcrawl
PVU
security
Servers
session management
user authentication
web applications
cloud SaaS applications
authentication
authorisation
authorization
authorized access
Big Data
big data security in the cloud
client authentication
Cloud Computing
cloud resource security
access management
collaboration
computing industry
data privacy
Databases
internet
Internet of Things
IT resources sharing
JSON token-based authentication
JSON Web Token (JWT)
biblio
A more secure scheme for CAPTCHA-based authentication in cloud environment
Submitted by grigby1 on Wed, 12/20/2017 - 12:03pm
Phishing
human beings
Human Factors
information technology
message authentication
modified characters
on-demand network access
passkey
password guessing
password-based authentication
Human behavior
pubcrawl
salted hashes
secure scheme
security-related issues
short-password attack
single password
social engineering
user authentication
composability
authentication mechanism
authorisation
CAPTCHA
CAPTCHA-based authentication
captchas
Cloud Computing
cloud environment
cloud provider
cloud providers
authentication
Computer crime
configurable adaptive resources
critical security function
Cryptography
Dictionaries
dictionary attack
elastic collection
Handheld computers
biblio
Generating Secret Keys from Biometric Body Impedance Measurements
Submitted by grigby1 on Mon, 06/05/2017 - 11:24am
biometric template
biometric trait
body impedance
feature extraction
Human behavior
key generation
key guessing
Metrics
pubcrawl
random key generation
Resiliency
Scalability
user authentication
biblio
Challenges of Deploying PKI Based Client Digital Certification
Submitted by grigby1 on Mon, 04/24/2017 - 10:45am
digital certification
Human behavior
Phishing
phishing attack
pubcrawl
public key infrastructure (pki)
service development & management
user authentication
« first
‹ previous
1
2
3
4
next ›
last »