Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
identity authentication
biblio
Smart Cards with Biometric Influences: An Enhanced ID Authentication
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
biometrics integration
smartcards
smart cards
Smart card
Processing time
privacy concerns
possible biometric solution
identity authentication
human interfaces
human beings
highly reliable support system
FRR
FAR
enhanced ID authentication
DNA technology
DNA
Cryptography
biometric technologies
biometric techniques
biometric key considerations
biometric influences
biometric encryption
biometrics
biometric technology
resilience
biometrics (access control)
Scalability
data privacy
Resiliency
Metrics
pubcrawl
biblio
A Secure Identity Authentication Scheme Based on Blockchain and Identity-Based Cryptography
Submitted by grigby1 on Thu, 03/12/2020 - 11:02am
signature based defense
pubcrawl
blockchain
challenge-response protocol
identity authentication
identity-based cryptography
resilience
Resiliency
Scalability
biblio
Improving Wireless Network Security Based On Radio Fingerprinting
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
security threats
Wireless Network Security
wireless device transmitters
transient signals
radio transmitters
Radio Frequency Fingerprints
radio frequency fingerprint extraction
radio fingerprinting
physical characteristics
fractional fourier transform
Fourier transforms
identity authentication
wireless networks
sensor security
authorisation
Signal to noise ratio
Transient analysis
Metrics
wireless devices
Communication system security
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
feature extraction
security
telecommunication security
biblio
Polynomial-based Lightweight Key Management in a Permissioned Blockchain
Submitted by aekwall on Mon, 01/20/2020 - 10:49am
polynomial
transaction confidentiality
telecommunication security
system scalability
security
Scalability
Resiliency
public-key schemes
public-key operations
public-key infrastructure
public key cryptography
pubcrawl
polynomials
polynomial-based schemes
128-bit modulus size
PKI
permissioned blockchain platform
lightweight polynomial-based key management scheme
identity authentication
exponentiation
expensive modular exponentiation operations
data confidentiality
Cryptography
cryptocurrencies
computationally less intensive polynomial evaluation operations
blockchain applications
blockchain
2048-bit RSA
biblio
A Bimodal Biometric Verification System Based on Deep Learning
Submitted by grigby1 on Mon, 11/19/2018 - 11:20am
convolutional neural networks
deep learning
deep video
Feature fusion
identity authentication
Metrics
multi-modal biometrics
pubcrawl
resilience
Resiliency
Scalability
biblio
A Kind of Identity Authentication under Cloud Computing Environment
Submitted by Heather Lucas on Fri, 05/08/2015 - 3:05pm
homomorphism technology
voice technology
voice login and authentication stage
Training
Spectrogram
Servers
register and training template stage
public key cryptography
identity authentication scheme
identity authentication
audit stage
homomorphism
encryption technology
encryption
cloud computing environment
Cloud Computing
biometric encryption
authorization stage
authorisation
authentication
biblio
A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol
Submitted by BrandonB on Tue, 05/05/2015 - 8:03am
password guessing attack
wireless mesh networks
wireless mesh network
synchronisation
storing key
Servers
random numbers
public key encryption
public key cryptography
Public key
Protocols
authentication
malicious software
Kerberos protocol
improved Kerberos protocol
identity authentication scheme
identity authentication
Cryptographic Protocols
clock synchronization
authorization
authentication protocol
biblio
The design of the secure transmission and authorization management system based on RBAC
Submitted by BrandonB on Mon, 05/04/2015 - 1:54pm
group authority
SSL protocol
server-side digital certificate
Rose-based access control
RBACt
RBAC model
public key infrastructure
public key cryptography
PKI principles
PKI
MVC model
internet
identity authentication
Abstracts
Electronic government
E-Government
distributed authority management
Digital certificate
data secure transmission
client-side digital certificate
certificate authority system
centralized authority
authorization management system
authorization
authorisation
Aspect-oriented programming
« first
‹ previous
1
2