Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication system
biblio
Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System
Submitted by grigby1 on Tue, 06/14/2022 - 2:15pm
Metrics
IRIS datasets
electric vehicle
Charging Systems
authentication system
electric vehicle charging
Costs
biometric encryption
Oils
KNN
encryption
Databases
privacy
authentication
Scalability
Resiliency
resilience
pubcrawl
search problems
biblio
A Usable Authentication System Using Wrist-Worn Photoplethysmography Sensors on Smartwatches
Submitted by aekwall on Mon, 02/17/2020 - 1:57pm
haemodynamics
wearables security
wrist-worn photoplethysmography sensors
true rejection rate
tendon movements
smartwatches
raw PPG signals
private consumer market
PPG sensors
photoplethysmography
muscle movements
mobile sensing
medical signal processing
hand gesture
Scalability
blood vessels
blood flow
authentication system
arterial geometry
wearable computers
patient monitoring
gesture recognition
authentication
privacy
pubcrawl
Human behavior
Resiliency
Data Security
biblio
Achieving Privacy and Security Using QR Code by Means of Encryption Technique in ATM
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Online banking
triple DES algorithm
transmission process
smart cards
Smart card
Servers
secret filming
secret code
Resiliency
QR codes
QR code
pubcrawl
Personal Identification Number
peeping attack
ATM machine
Mobile Applications
Mobile Application
encoded QR information
DES algorithm
Databases
data privacy
Data Encryption Standard
cyber physical systems
Cryptography
Automated Teller Machine
authorisation
authentication system
authentication
biblio
i/k-Contact: A context-aware user authentication using physical social trust
Submitted by BrandonB on Tue, 05/05/2015 - 7:56am
Mobile-device-management (MDM)
visualization
visual contact
user authentication
ubiquitous computing
Trusted Computing
Social trust
Servers
physical trust relationship
physical social trust
Physical communication
authentication
Mobile handsets
i-k Contact mechanism
context-aware user authentication
Context-aware security
Context
Companies
Big Data application
authorisation
authentication system
authentication control