Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
credentials
biblio
USB Flash Drives Forensic Analysis to Detect Crown Jewel Data Breach in PT. XYZ (Coffee Shop Retail - Case Study)
Submitted by grigby1 on Wed, 06/08/2022 - 9:20am
Universal Serial Bus
USB Flash Drives
retail
Recipe
Crown Jewel
Credit Card Data
credentials
forensic
Information filters
Imaging
intellectual property security
pubcrawl
Media
hashing
intellectual property
Data Breach
composability
Companies
Access Control
Resiliency
resilience
policy-based governance
biblio
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
Human behavior
shamir secret sharing
Self-Sovereign Identity
secure management
Scalability
resilience
pubcrawl
Protocols
proof-of-concept digital wallet
practical key recovery model
password
Online banking
key recovery
identity management services
Identity management
Hyperledger Indy distributed ledger technology
authorisation
financial data processing
distributed ledger
digital wallet
digital identity management
decentralized key recovery solution
data privacy
Data models
Cryptography
cryptographic keys
cryptocurrency
cryptocurrencies
credentials
Computational modeling
blockchain
biblio
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain
Submitted by grigby1 on Thu, 08/23/2018 - 10:49am
Compositionality
pubcrawl
composability
blockchain
zero-knowledge
composable security
credentials
delegation
hierarchical issuance
privacy-preserving authentication
Computing Theory
file
ACT2 Defense of Accounts Overview
Submitted by rzager on Fri, 09/16/2016 - 3:57pm. Contributors:
Art Friedman
Joel Rader
Danny Goff
Don French
Robert Zager
Overview of Defense of Accounts integrated defense
Science of Security
credentials
honeypot
spearphishing
Federated identity
two factor authentication
United States of America
Research Organization
Documentation
biblio
A Multi-token Authorization Strategy for Secure Mobile Cloud Computing
Submitted by BrandonB on Wed, 05/06/2015 - 12:22pm
multitoken authorization strategy
security
Secure Mobile Computing
secure mobile cloud computing
radio links
privacy
Organizations
omnipresent mobile-based clients
OAuth
security of data
Modified Identity Management System
mobile computing
Mobile communication
mobile cloud computing
mathematical modeling
mathematical analysis
malicious code
IdM
Computer hacking
trust
traffic interception
identity management systems
identity management system
Hacker
data privacy
credentials
computing models
vulnerable wireless communication links
cloud resources
cloud computing security
Cloud Computing
authorization architecture
authorization
authorisation
Access Control
Servers