Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

identity authentication scheme

biblio

Visible to the public A Kind of Identity Authentication under Cloud Computing Environment

Submitted by Heather Lucas on Fri, 05/08/2015 - 4:05pm
  • homomorphism technology
  • voice technology
  • voice login and authentication stage
  • Training
  • Spectrogram
  • Servers
  • register and training template stage
  • public key cryptography
  • identity authentication scheme
  • identity authentication
  • audit stage
  • homomorphism
  • encryption technology
  • encryption
  • cloud computing environment
  • Cloud Computing
  • biometric encryption
  • authorization stage
  • authorisation
  • authentication
biblio

Visible to the public A Novel Identity Authentication Scheme of Wireless Mesh Network Based on Improved Kerberos Protocol

Submitted by BrandonB on Tue, 05/05/2015 - 9:03am
  • password guessing attack
  • wireless mesh networks
  • wireless mesh network
  • synchronisation
  • storing key
  • Servers
  • random numbers
  • public key encryption
  • public key cryptography
  • Public key
  • Protocols
  • authentication
  • malicious software
  • Kerberos protocol
  • improved Kerberos protocol
  • identity authentication scheme
  • identity authentication
  • Cryptographic Protocols
  • clock synchronization
  • authorization
  • authentication protocol

Terms of Use  |  ©2023. CPS-VO