Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication process
biblio
Implement Time Based One Time Password and Secure Hash Algorithm 1 for Security of Website Login Authentication
Submitted by aekwall on Mon, 06/08/2020 - 10:33am
process user authentication
hash algorithms
word length 160.0 bit
Website login authentication
website
username
user passwords
user access rights
time-based one time password
time limit
Time Based One Time Password
time 30.0 s
SHA1
Secure Hash Algorithm 1 generate code
Secure Hash Algorithm 1
authorisation
information system access
factor authentication method
authentication process
account number
two-factor authentication
Compositionality
Information systems
message authentication
authentication
Web sites
pubcrawl
Resiliency
Cryptography
biblio
Privacy Preservation and Mandate Representation in Identity Management Systems
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
resilience
OpenID Connect framework
privacy
privacy enhanced solutions
privacy issues
privacy requirements yardstick
private data
protecting users identity
pubcrawl
redundant users data
requestors
mobile phone
Scalability
service provider
service providers
services identity management systems
User-centred
user-centred mandate representation system
users autonomous powers
users digital identities
users participation
web services
digital data
access token
authenticated entities
authentication
authentication process
authenticity
authorisation
authorisation service
authorization
data owner
data privacy
access rights
electronic services
electronic space
fine-grained access
Human behavior
identity data
Identity management
identity management systems
internet
Internet usage
Mandate representation
biblio
A Lightweight Anonymous Mobile User Authentication Scheme for Smart Grid
Submitted by grigby1 on Fri, 02/08/2019 - 3:35pm
smart meter
nonlight-weight protocol
portable access
pubcrawl
public key cryptography
Security analysis
smart cards
Smart Grid
smart grid technology
mobile computing
smart power grids
subsequent communication
telecommunication security
two factor authentication
two-factor lightweight user authentication scheme
two-factor user authentication
user anonymity
anonymous and untraceability
message authentication
Lightweight Encryption
lightweight anonymous mobile user authentication scheme
Human Factors
Human behavior
electric vehicle
data privacy
Cryptographic Protocols
critical security
communication process
cloud server
charging process
biometric encryption
authorisation
authentication process
biblio
Robust Multi-Factor Authentication for Fragile Communications
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
Large-scale systems
user authentication
telecommunication services
stand-alone authentication
stand-alone
slow connection situation
Servers
secure generic multifactor authentication protocol
robust multifactor authentication
remote central authentication server
Protocols
privacy
natural disasters
multi-factor
authentication
fragile communications
file servers
emergency situations
efficiency
digital signatures
Cyber Attacks
Communication channels
biometrics (access control)
authorisation
authentication service
authentication process
authentication mechanism