Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mutual authentication
biblio
Secure Two-Factor Authentication for IoT Device
Submitted by grigby1 on Fri, 04/14/2023 - 4:09pm
Protocols
Constraint device
Force measurement
two-factor authentication
mutual authentication
brute force attacks
MQTT
Force
Fingerprint recognition
Internet of Things
authentication
IoT device
policy-based governance
Human Factors
Human behavior
pubcrawl
security
collaboration
biblio
A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
Submitted by grigby1 on Fri, 05/06/2022 - 10:32am
resilience
secure authentication
key agreement
DNA cryptography
smart cards
mutual authentication
DNA
Mathematics
parallel processing
pubcrawl
Metrics
encoding
Protocols
privacy
authentication
Resiliency
Human behavior
biblio
Security-Enhanced SDN Controller Based Kerberos Authentication Protocol
Submitted by aekwall on Fri, 04/01/2022 - 2:12pm
password
Servers
authentication
Protocols
Scalability
software defined networking
SDN
Kerberos
pubcrawl
Resiliency
controller
DoS attack
Host impersonate attack
mutual authentication
SDN security
biblio
A Three-Party Mutual Authentication Protocol for Wearable IOT Health Monitoring System
Submitted by grigby1 on Mon, 01/31/2022 - 3:46pm
authentication
WIHMS
Three-Party
Internet of Things(IoT)
wearables security
wearable computers
wearable sensor
mutual authentication
Databases
Protocols
Internet of Things
Scalability
performance evaluation
Resiliency
resilience
Human behavior
pubcrawl
security
privacy
biblio
A new mutual authentication and key agreement protocol in wireless body area network
Submitted by grigby1 on Thu, 05/13/2021 - 12:10pm
anonymous messaging
authentication
Biomedical monitoring
body area networks
Cryptography
key agreement
mutual authentication
Protocols
pubcrawl
resilience
Resiliency
security
WBAN
Wireless communication
wireless sensor networks
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
information leakage attack
visualization
visual secret sharing
user anonymity
two-factor user authentication framework
strong authentication scheme
session key establishment
Servers
pubcrawl
password
mutual authentication
middle attack
authentication
Human behavior
essential security services
enhanced user participating authenticating scheme
dynamic session key fur subsequent communication
Cryptography
cryptanalysis
composability
client-server internetworking systems
Chen and Huang scheme
captchas
CAPTCHA
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
mutual authentication
Servers
Scalability
resource-rich server authentication
Resistance
Resiliency
resilience
replay attacks
Registers
PUF-based authentication method
pubcrawl
Protocols
Policy-Governed Secure Collaboration
policy-based governance
physical unclonable function-based authentication protocol
physical unclonable function (PUF)
active deception protocol
Multiplexing
ML attack
machine learning attacks
learning (artificial intelligence)
Generators
false trust
false PUF multiplexing
Cryptographic Protocols
challenge response pairs
Buildings
binary channel
authentication protocol
authentication
authentic CRP
attack resistant deception technique
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
source nonrepudiation
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
malicious viruses
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
authentication
live VM migration
live migration
Human behavior
enhanced secure mechanism
DDoS Attacks
data integrity
data confidentiality
computer viruses
Computational modeling
composability
Cloud federations
Cloud Computing
AVISPA tool
authorization
authorisation
1
2
3
next ›
last »