Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human factor
biblio
SCLCT: Secured cross language cipher technique
Submitted by grigby1 on Wed, 02/21/2018 - 1:44pm
Rails
Metrics
modern era possesses cryptography
open source language
Policy
Policy-Governed Secure Collaboration
privacy
pubcrawl
Rail Fence Cipher
Java
resilience
Resiliency
Scalability
SCLCT Cipher
secret codes
secured cross language cipher technique
security
cryptology
Caesar Cipher
cipher text
Ciphers
CLCT Cipher
collaboration
composability
computing device
Cryptography
automation
data privacy
empowering citizens
encryption
evolving digitization
fascinating science
Human behavior
human factor
biblio
A Secure Algorithm for Outsourcing Matrix Multiplication Computation in the Cloud
Submitted by grigby1 on Wed, 02/21/2018 - 1:44pm
Cloud Computing
collaboration
composability
cryptology
Human behavior
human factor
matrix multiplication
Metrics
outsourcing computation
Policy
Policy-Governed Secure Collaboration
Privacy-preserving
pubcrawl
resilience
Resiliency
Scalability
biblio
Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms
Submitted by grigby1 on Wed, 02/21/2018 - 1:44pm
marble
universal forgery attack
Scalability
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
Policy
Metrics
authenticated encryption algorithm
human factor
Human behavior
cryptology
COPA
composability
collaboration
authentication
biblio
Cloud security ecosystem for data security and privacy
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
Ecosystems
Resiliency
resilience
pubcrawl
multifactor authentication
Metrics
IT industry
hybrid cryptographic system
Human Factors
human factor
Human behavior
HCS
encryption
authentication
Data Security
data privacy
CSP
Cryptography
CloudSim simulator
CloudSim
cloud service providers
cloud security ecosystem
Cloud Security
Cloud Computing
cloud adoption
biblio
Reinforcing Security Requirements with Multifactor Quality Measurement
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
security requirements
quantitative statistical analysis
requirements analysts
requirements elicitation
requirements engineering
resilience
Resiliency
scenarios
security of data
security quality ratings
qualitative analysis
security requirements elicitation
security requirements reinforcement
software quality
Stakeholders
statistical analysis
user study
vignettes
weak security constraints
minimal analyst expertise
authentication
Context
Databases
elicited expert preferences
Formal Specification
Human behavior
human factor
Human Factors
Metrics
Analytical models
MQM
multifactor authentication
Multifactor Quality measurement
Multifactor Quality Method
natural language scenarios
Natural languages
operating systems
pubcrawl
biblio
Secure authentication on the Internet of Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
lightweight cryptographic algorithms
user credential protection
universal access
Servers
resource constrained environments
Resiliency
resilience
pubcrawl
Protocols
Phishing
mutual multifactor authentication
multifactor authentication
Metrics
memory requirements
man-in-the-middle attacks
authentication
Internet of Things
Human Factors
human factor
Human behavior
Cryptography
Cryptographic Protocols
confidential communications
Computer crime
code size
Ciphers
biometrics (access control)
biometrics
biometric-based cryptographic techniques
biometric authenticated key exchange protocol
biblio
Formal Verification of Protocols Based on Short Authenticated Strings
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
ISO-IEC 9798-6:2010 standard
tools
standards
short authenticated strings
security protocols
security
Resiliency
resilience
pubcrawl
Protocols
multifactor authentication protocol
multifactor authentication
Metrics
Mathematical model
AKISS tool
ISO standards
IEC standards
Human Factors
human factor
Human behavior
formal verification
Force
decision procedure
data privacy
Cryptographic Protocols
Calculus
brute force attacks
biblio
Multi-factor authentication using accelerometers for the Internet-of-Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
Metrics
sensor security
security of data
security harvesting
Resiliency
resilience
pubcrawl
Protocols
Pins
multifactor authentication
Multi-factor authentication
mobile devices
mobile computing
Accelerometers
IoT
Internet-of-Things
Internet of Things
Human Factors
human factor
Human behavior
Hardware
experimental embedded system
embedded systems
embedded devices
authentication
biblio
Pick location security: Seamless integrated multi-factor authentication
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
pick location security
Mobile Applications
mobile computing
mobile device
Mobile handsets
Multi Factor Authentication
Multi-factor authentication
multifactor authentication
multifactor authentication system
Metrics
pubcrawl
resilience
Resiliency
seamless integrated multifactor authentication
sensitive data protection
Servers
user mobile device location
global positioning system (GPS)
authentication method
authorisation
Bluetooth
Bluetooth device
browser
Data protection
device Bluetooth key
Global Positioning System
authentication
Human behavior
human factor
Human Factors
identity theft
impersonation
location
message authentication
biblio
NFC Unlock: Secure Two-Factor Computer Authentication Using NFC
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
record keeping
Near Field Communication technology
near-field communication
NFC
NFC authentication
NFC unlock
passcode
pGina
pubcrawl
Near Field Communication
resilience
Resiliency
secure multifactor authentication system
SMS code
standard Windows credentials
telecommunication computing
text alerts
two-factor computer authentication
human factor
authentication
authorisation
Cryptography
C\#
C\# language
C\# languages
encryption
Human behavior
advanced encryption standard
Human Factors
login attempts
message authentication
Metrics
mobile computing
multifactor authentication
Multiple-factor Authentication
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »