Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
identity authentication
biblio
Research on iOS Remote Security Access Technology Based on Zero Trust
Submitted by grigby1 on Fri, 12/02/2022 - 10:10am
mechatronics
zero trust
Teleworking
ShangMi (SM) cryptographic algorithms
Resiliency
resilience
pubcrawl
Prototypes
process control
Acoustic Fingerprints
information security
identity authentication
Human Factors
Human behavior
Epidemics
computer architecture
composability
Access Control
biblio
Identity Authentication Based on Domestic Commercial Cryptography with Blockchain in the Heterogeneous Alliance Network
Submitted by aekwall on Tue, 04/19/2022 - 10:17am
Cryptography
blockchain
authentication
encryption
Resiliency
composability
standards
component
Cryptographic Protocols
pubcrawl
Domestic commercial cryptography
Heterogeneous alliance network
identity authentication
zero knowledge proof
Cross Layer Security
biblio
Preventing IoT DDoS Attacks using Blockchain and IP Address Obfuscation
Submitted by grigby1 on Wed, 04/13/2022 - 1:53pm
composability
DDoS Attack Prevention
IP address obfuscation
distributed denial of service
blockchains
identity authentication
denial-of-service attack
Internet of Things
Signal processing algorithms
Metrics
signal processing
Wireless communication
authentication
Resiliency
resilience
Human behavior
pubcrawl
blockchain
Computer hacking
biblio
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
Submitted by aekwall on Fri, 02/25/2022 - 9:44am
privacy
performance evaluation
authentication
Protocols
pubcrawl
Resiliency
Internet of Things
Industries
Compositionality
Predictive Metrics
provable security
Elliptic curves
Computers
Bilinear Pairing
identity authentication
Key exchange
biblio
Real Identity Based Access Control Technology under Zero Trust Architecture
Submitted by grigby1 on Tue, 12/21/2021 - 2:21pm
Admission control
collaboration
Human behavior
Human Factors
identity authentication
policy-based governance
pubcrawl
resilience
Resiliency
Scalability
zero trust
Zero trust architecture
biblio
Research on Security Strategy of Power Internet of Things Devices Based on Zero-Trust
Submitted by grigby1 on Tue, 12/21/2021 - 2:20pm
OpenFlow
zero-trust
zero trust
telecommunication traffic
Scalability
Resiliency
resilience
pubcrawl
Protocols
policy-based governance
Access Control
network security
identity authentication
Human Factors
Human behavior
equipment portrait
computer network reliability
computer architecture
collaboration
authentication
biblio
TAES: Two-factor Authentication with End-to-End Security against VoIP Phishing
Submitted by grigby1 on Thu, 07/08/2021 - 2:51pm
smart phones
Voiceprint recognition
voice-print
voice
two factor authentication
Telecommunications
Speech recognition
Spectrogram
speaker recognition
authentication
security
pubcrawl
MFCC
identity authentication
Human Factors
Human behavior
GMM-UBM
biblio
A High Security Signature Algorithm Based on Kerberos for REST-style Cloud Storage Service
Submitted by aekwall on Wed, 07/07/2021 - 3:48pm
identity authentication
Ubiquitous Computing Security
Servers
Security Module
security
Scalability
rest
pubcrawl
Protocols
password
Kerberos
Human Factors
Distributed databases
cloud storage
Cloud Computing
authentication
Human behavior
Metrics
Resiliency
Cryptography
biblio
Policy-Based Network Access and Behavior Control Management
Submitted by grigby1 on Mon, 03/29/2021 - 1:25pm
Protocols
Identity management
illegal outreach control
information network
integrated network access
management simplification
Network Access Control
network device
network servers
policy-based network access
process control
identity authentication
pubcrawl
resilience
Scalability
security
security management
security monitoring
security policies
security policy
Servers
behavior control model
Resiliency
composability
Predictive Metrics
abstract policy configuration
Access Control
application server
application system access control
authorisation
behavior control management
Networked Control Systems Security
behavior management control
behavior management control process
Communication networks
computer network management
data drive
Data Driven
data fusion
device connection
Human behavior
biblio
Study on E-government Information Security in the Era of Big Data
Submitted by grigby1 on Fri, 10/16/2020 - 10:13am
network technology defects
information management
information management departments
information security awareness
information security threats
information storage
intranets
large-scale network
management deficiency
information confidentiality
policy-based governance
proper information encryption
pubcrawl
resilience
Resiliency
set pair analysis theory
strict information management
survivability association
e-government hierarchy model
Cloud Computing
collaboration
complex system
Cryptography
Cybersecurity
data application
E-Government
E-government development
Big Data
e-government information management
e-government information security system
Electronic government
encryption
government data processing
Human behavior
identity authentication
1
2
next ›
last »