Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
user authentication
biblio
"Hybrid cryptosystem for maintaining image integrity using biometric fingerprint"
Submitted by grigby1 on Tue, 02/14/2017 - 12:35pm
hybrid cryptosystem
user authentication
transmission
secure image transmission
secret fragment visible mosaic image method
pubcrawl170102
PSNR
mosaic image
key generation
image security
image parameter
image lossless compression technique
image integrity
image data integrity
image compression
Image coding
authentication
human being
Fingerprint recognition
encryption purpose
encryption
data hiding encryption
data compression
data communication
Cryptography
confidential information
Compression
biometrics (access control)
biometric fingerprint
Biomedical imaging
authorisation
authentication purpose
biblio
Android #x0022;Health-Dr. #x0022; Application for Synchronous Information Sharing
Submitted by BrandonB on Wed, 05/06/2015 - 2:16pm
middleware
Health-DR. Engineering
healthy environment
Insurance
Insurance acumen or actuary
insurance agent
IT environment
medical annals
Medical services
electronic health records
Mobile communication
mobile computing
patient affability
Patient flexibility
physician
professional authentications
synchronous information sharing
user authentication
bibliography
Alert mechanism
ambulatory appliances
Android (operating system)
Android Health-Dr
Androids
annals management
Annotations of records
authentication
affability management
client discovery
database transit
Databases
dispensary
doctor affability
Doctor Flexibility
e-health application
Educational institutions
biblio
Privacy protection in cloud using identity based group signature
Submitted by BrandonB on Wed, 05/06/2015 - 11:08am
Elliptic curve cryptography
user authentication
security problems
secure anonymous authentication method
privacy protection
privacy problems
privacy
identity based group signature
identity based cryptosystem
group signature
authentication
digital signatures
data privacy
Cryptography
cloud services
Cloud Security
Cloud Computing
cloud
authorisation
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism
biblio
i/k-Contact: A context-aware user authentication using physical social trust
Submitted by BrandonB on Tue, 05/05/2015 - 8:56am
Mobile-device-management (MDM)
visualization
visual contact
user authentication
ubiquitous computing
Trusted Computing
Social trust
Servers
physical trust relationship
physical social trust
Physical communication
authentication
Mobile handsets
i-k Contact mechanism
context-aware user authentication
Context-aware security
Context
Companies
Big Data application
authorisation
authentication system
authentication control
biblio
Conceptual framework for high-end graphical password
Submitted by BrandonB on Tue, 05/05/2015 - 8:54am
graphical user interfaces
user performance experimental analysis
user authentication
usability
text-based alphanumerical passwords
secure password
Proposals
Human Factors
high-end graphical password
authentication
graphical password method
Graphical Password
Face
Databases
Complexity theory
Communications technology
authorisation
biblio
An ID-Based User Authentication Scheme for Cloud Computing
Submitted by BrandonB on Tue, 05/05/2015 - 8:37am
anonymity
authentication
authorisation
authorization
Cloud Computing
cloud computing environments
Cryptography
ID-based scheme
ID-based user authentication scheme
Law
mobile devices
Nickel
Servers
user authentication
biblio
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Submitted by BrandonB on Mon, 05/04/2015 - 2:52pm
Geo-Detection
Virtualization
virtualisation
user authentication
security
secure access
Second Verification
Reliability
internet
authentication
geo detection
GD2SA
digital signatures
digital signature authorization
Computational modeling
Cloud Computing
authorization
authorisation
biblio
Improved privacy-preserving authentication scheme for roaming service in mobile networks
Submitted by BrandonB on Mon, 05/04/2015 - 2:07pm
Password authentication
user authentication
user anonymity
telecommunication security
symmetric-key techniques
smart cards
Smart card
security-related issues
security mechanism
roaming service
Roaming
Protocols
authentication
offline password guessing attacks
nontamper-resistant assumption
mobile users
mobile radio
mobile networks
mobile computing
Mobile communication
message authentication
improved privacy-preserving two-factor authentication scheme
Cryptography
« first
‹ previous
1
2
3
4