Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

secure authentication procedure

biblio

Visible to the public BIAS: Bluetooth Impersonation AttackS

Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
  • attacks
  • wireless communication pervasive technology
  • slave impersonation attacks
  • secure connection establishment
  • secure authentication procedure
  • mandatory mutual authentication
  • impersonation
  • Bluetooth version
  • Bluetooth standard
  • Bluetooth Impersonation AttackS
  • Bluetooth devices
  • Bluetooth chips
  • BIAS attacks
  • authentication procedure
  • bluetooth security
  • wireless security
  • authorisation
  • mobile radio
  • ubiquitous computing
  • composability
  • standards
  • Protocols
  • Cryptography
  • authentication
  • performance evaluation
  • telecommunication security
  • Resiliency
  • resilience
  • Human behavior
  • pubcrawl
  • Bluetooth
biblio

Visible to the public A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme

Submitted by BrandonB on Mon, 05/04/2015 - 2:49pm
  • Mobile communication
  • telecommunication security
  • security
  • secure authentication procedure
  • proxy mobile IPv6
  • Protocols
  • PMIPV6 based network mobility scheme
  • network mobility
  • NEMO
  • MR
  • mobility management (mobile radio)
  • mobile router
  • mobile platforms
  • mobile computing
  • AAA servers
  • mobile access gateway
  • MAG
  • LMAIFPNEMO
  • lightweight mutual authentication mechanism
  • Internet access
  • IFP-NEMO protocol
  • Handover
  • AVISPA software
  • AVISPA
  • automated validation of internet security protocols and applications
  • authentication authorization and accounting
  • authentication

Terms of Use  |  ©2023. CPS-VO