Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
biometric encryption
biblio
Fingerprint Authentication Using LT Codes
Submitted by grigby1 on Fri, 03/22/2019 - 12:36pm
biometric encryption
biometrics
enhancement
fingerprint
Metrics
minutiae
pubcrawl
rateless codes
resilience
Resiliency
Scalability
biblio
Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers
Submitted by grigby1 on Fri, 03/22/2019 - 12:36pm
biometric encryption
Cloud backup
Digital identity
Metrics
Password-Protected Secret Sharing
pubcrawl
resilience
Resiliency
Scalability
Secret key reconstruction
biblio
Vulnerability Analysis of Secure USB: Based on the Fingerprint Authentication of Product B
Submitted by grigby1 on Fri, 03/22/2019 - 12:36pm
biometric authentication
biometric encryption
Metrics
pubcrawl
resilience
Resiliency
Scalability
secure USB
user authentication
Vulnerability Analysis
biblio
Ransomware Prevention Using Application Authentication-Based File Access Control
Submitted by grigby1 on Fri, 03/22/2019 - 12:36pm
Access Control
antibotics
authorization
biometric encryption
biometrics
comparability
Metrics
pubcrawl
Ransomware
resilience
Resiliency
Scalability
biblio
IoT Securing System Using Fuzzy Commitment for DCT-Based Fingerprint Recognition
Submitted by grigby1 on Fri, 03/22/2019 - 12:36pm
Fingerprint recognition
Servers
Scalability
Resiliency
resilience
pubcrawl
Metrics
IoT security
IoT securing system
IoT features
Internet of Things
fuzzy set theory
fuzzy commitment scheme
fuzzy commitment
FRR criteria
authentication
fingerprint identification
feature extraction
FAR criteria
error-corrector codes
encryption system
encryption
discrete cosine transforms
DCT-based recognition method
DCT-based fingerprint recognition
DCT
Databases
Cryptography
computer network security
biometric encryption
biblio
Cancelable Biometrics Technique for Iris Recognition
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
encryption noninvertible transformation
support vector machine
Scalability
Resiliency
resilience
Reliability
recognition rate
pubcrawl
Non-linear Quadratic kerne
Metrics
Iris recognition
feature extraction
Bath-A dataset
encryption
decryption noninvertible transformation
Databases
Cryptography
cancelable biometrics method
cancelable biometrics features
cancelable biometrics
biometric encryption
biometric data
bioinformatics
biblio
Secure and Lightweight Biometric-Based Remote Patient Authentication Scheme for Home Healthcare Systems
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
remote medical treatment
Metrics
Mobile handsets
mobile healthcare system communication
patient care
pubcrawl
public key cryptography
public mobile healthcare environments
Remote authentication
Medical services
resilience
Resiliency
Scalability
secure based remote patient authentication scheme
security
security of data
Servers
healthcare system
biometric
biometric encryption
biometrics (access control)
digital systems
e-Healthcare
elliptic curve encryption
Elliptic curves
health care
authentication
home computing
home healthcare system
lightweight biometric-based remote patient authentication scheme
medical computing
medical data
Medical diagnostic imaging
medical information systems
biblio
Hardware Implementation of Multi-Scroll Chaos Based Architecture for Securing Biometric Templates
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
hardware resources
Xilinx FPGA
Xilinx
Security analysis
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
multiscroll chaos based architecture
multi-scroll
Metrics
Mathematical model
low cost image encryption
Image Processing
biometric encryption
Hardware
FPGA
field programmable gate arrays
Euler method
embedded systems
embedded biometric systems
Cryptography
computer architecture
chaotic N × N grid multiscroll system
chaotic communication
chaos-based multiscroll encryption algorithm
chaos
biometrics-based personal authentication systems
biometrics (access control)
biometric templates
biblio
Encryption Using Finger-Code Generated from Fingerprints
Submitted by grigby1 on Fri, 03/22/2019 - 12:35pm
Fingerprint recognition
smart cards
Scalability
Resiliency
resilience
pubcrawl
minutiae points
minutiae
Metrics
Length measurement
fingerprints
fingerprint ridges
biometric encryption
fingerprint features
fingerprint
finger-code
encryption keys
encryption
Elliptic curve cryptography
Cryptography
cryptographic key generation
biometrics (access control)
biometric key
biblio
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
Submitted by grigby1 on Fri, 02/08/2019 - 4:35pm
smart meter
nonlight-weight protocol
portable access
pubcrawl
public key cryptography
Security analysis
smart cards
Smart Grid
smart grid technology
mobile computing
smart power grids
subsequent communication
telecommunication security
two factor authentication
two-factor lightweight user authentication scheme
two-factor user authentication
user anonymity
anonymous and untraceability
message authentication
Lightweight Encryption
lightweight anonymous mobile user authentication scheme
Human Factors
Human behavior
electric vehicle
data privacy
Cryptographic Protocols
critical security
communication process
cloud server
charging process
biometric encryption
authorisation
authentication process
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »