Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication scheme
biblio
A Lightweight Identity-Based Secondary Authentication Method in Smart Grid
Submitted by grigby1 on Fri, 01/20/2023 - 4:07pm
pubcrawl
resilience
Resiliency
Safety
Scalability
authentication
5G mobile communication
Protocols
Smart Grid
Smart Grids
Metrics
smart grid security
network slicing
Costs
5G slicing
authentication scheme
biblio
A Yoking-Proof Based Remote Authentication Scheme for Cloud-Aided Wearable Devices (YPACW)
Submitted by grigby1 on Thu, 05/20/2021 - 11:15am
Protocols
Yoking Proof
wearables security
Wearable devices
wearable computers
Servers
Scalability
Resiliency
resilience
pubcrawl
authentication
privacy
Metrics
IoT
Human behavior
Hafnium
Cloud Computing
Biomedical monitoring
authentication scheme
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 10:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
Key distribution protocol for Identity Hiding in MANETs
Submitted by aekwall on Mon, 11/02/2020 - 1:40pm
identity
authentication scheme
mobile nodes
central administration
mobile ad-hoc networks
anonymous
centralization problem
centralized counterpart
clustered ad-hoc networks
high dense networks
wireless links
identity disclosure
identity hiding
identity spoofing
key distribution protocol
key distribution scheme
networks scales
periodically updated security keys
manet privacy
authentication
Receivers
telecommunication security
Cryptographic Protocols
Resiliency
pubcrawl
malicious nodes
Cryptography
Metrics
data privacy
Routing protocols
MANET
mobile ad hoc networks
MANETs
Ad hoc networks
mobile computing
Compositionality
cluster head
biblio
Machine Learning Models for Activity Recognition and Authentication of Smartphone Users
Submitted by aekwall on Mon, 04/06/2020 - 9:06am
Smartphone Authentication
pattern locks
technological advancements
smartphone users
smartphone embedded sensor data
personal identification numbers
daily physical activity
daily activities
Behavioral biometrics
authentication scheme
Activity Recognition
Scalability
private data
biometrics (access control)
message authentication
machine learning model
smart phones
machine learning
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
biblio
An Improved Cross-Layer Privacy-Preserving Authentication in WAVE-Enabled VANETs
Submitted by BrandonB on Tue, 05/05/2015 - 9:31am
Privacy-preserving
WAVE-enabled VANET
WAVE-based vehicular ad hoc networks
vehicular ad hoc networks
vehicles
VANETs
valid signature
telecommunication security
security strength evaluation
Security analysis
receiving entity
public key cryptography
Public key
private key reveal attack
private key cryptography
authentication
malicious receiving vehicle
legal signing vehicle
Law
improved cross-layer privacy-preserving authentication scheme
identity trace
identity revocation
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature algorithm
ECDSA
digital signatures
data privacy
authentication scheme