Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
human factor
biblio
Thumprint: Socially-Inclusive Local Group Authentication Through Shared Secret Knocks
Submitted by grigby1 on Wed, 07/18/2018 - 9:24am
Usable Security
two factor authentication
socially-inclusive authentication
social cybersecurity
sensors
pubcrawl
Human Factors
human factor
human behaviour
Human behavior
HCI
authentication
biblio
Two Factor Vs Multi-factor, an Authentication Battle in Mobile Cloud Computing Environments
Submitted by grigby1 on Wed, 07/18/2018 - 9:24am
multi-factor
authentication
biometrics
Human behavior
human behaviour
human factor
Human Factors
man-in-the-middle attack
mobile cloud computing
wireless
networks
pubcrawl
security
Sniffing
SSO
Two Factor
two factor authentication
biblio
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication
Submitted by grigby1 on Wed, 07/18/2018 - 9:23am
unlinkability
two factor authentication
Template Protection
pubcrawl
Multi-factor authentication
irreversibility
Human Factors
human factor
human behaviour
Human behavior
biometrics
biblio
I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication
Submitted by grigby1 on Wed, 07/18/2018 - 9:23am
two-factor authentication
two factor authentication
Survey study
Security in organizations
pubcrawl
Human Factors
human factor
human behaviour
Bring-your-own-device
2FA
Human behavior
BYOD
biblio
A Two-factor Based Remote User Authentication Scheme Using ElGamal Cryptosystem
Submitted by grigby1 on Wed, 07/18/2018 - 9:23am
authentication
AVISPA tool
BAN logic
ElGamal cryptosystem
Human behavior
human behaviour
human factor
Human Factors
pubcrawl
two factor authentication
biblio
A SDN security control forwarding mechanism based on cipher identification
Submitted by grigby1 on Wed, 05/16/2018 - 12:48pm
network management
user nonrepudiation
software defined networking
Servers
security control forwarding
SDN network security control forwarding mechanism
SDN
Resiliency
resilience
Repudiation
pubcrawl
programmability
packet authenticity
Object recognition
network services
authentication
network architecture
Metrics
human factor
Human behavior
forwarding device
flow table matching
Databases
Cryptography
control capabilities
computer network security
computer network management
composability
Ciphers
cipher identification
biblio
Digital signature using MAC address based AES-128 and SHA-2 256-bit
Submitted by grigby1 on Wed, 05/16/2018 - 12:48pm
MAC address
word length 256 bit
telecommunication security
standards
SHA-2 256 bit
Seminars
secure hash algorithm
Resiliency
resilience
Repudiation
pubcrawl
Metrics
advanced encryption standard
human factor
Human behavior
encryption
digital signatures
digital signature
digital messaging
Cryptography
computer science
composability
AES-128
biblio
Implementation of SERPENT cryptographic algorithm for secured data transmission
Submitted by grigby1 on Wed, 05/16/2018 - 12:48pm
key management
Technological innovation
symmetric key
substitution permutation network
SERPENT cryptographic algorithm
SERPENT
secured data transmission
s-box stage
round function
Resiliency
resilience
Repudiation
pubcrawl
Metrics
linear mixing stage
key scheduling
Algorithm design and analysis
IP networks
human factor
Human behavior
graphical programming tool
encryption
enciphering process
decryption
deciphering process
Data Security
data integrity
Cryptography
composability
Ciphers
Blockcipher
biblio
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
public key cryptography
Metrics
Montgomery multiplier
multiplying circuits
open-source software PBC implementation
optimal Ate pairing
Pairing based cryptography
pairing-based cryptography
PKC
Power measurement
pubcrawl
low-power electronics
public-key cryptography
Repudiation
resilience
Resiliency
sensors
simple power analysis
Software
system-on-chip
Zynq-7020 SoC
embedded electronic devices
Barreto-Naehrig curves
circuit optimisation
Clocks
composability
cryptographic services
cryptographic system
Cryptography
Differential Power Analysis
ECC
embedded
ARM Cortex A9 processor
energy consumption
field programmable gate arrays
Hardware
hardware-software co-design
hardware-software codesign
Human behavior
human factor
light-weight hardware/software co-design
lightweight devices
biblio
Non-Repudiable Provable Data Possession Scheme With Designated Verifier in Cloud Storage Systems
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
provable data possession
Metrics
non-repudiation
nonrepudiable PDP scheme
nonrepudiable provable data possession scheme
nonrepudiation issue
outsourced data
private auditability
private verifier
human factor
pubcrawl
Repudiation
resilience
Resiliency
security
Servers
storage management
associated tags
Human behavior
DV-PDP schemes
digital signatures
designated verifier
Data models
Data mining
data integrity
concrete DV-NRPDP scheme
Computational modeling
composability
cloud storage systems
cloud storage server
cloud storage
Cloud Computing
Cascading style sheets
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »