Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wearable Device
biblio
Privacy-Preserving Framework to Facilitate Shared Data Access for Wearable Devices
Submitted by grigby1 on Mon, 01/31/2022 - 3:49pm
Scalability
Health data sharing
wearables security
Wearable Device
wearable computers
Big Data
Protocols
Medical services
data privacy
privacy
Conferences
Resiliency
resilience
Human behavior
pubcrawl
blockchain
security
Adaptation models
biblio
A New Security Framework for Remote Patient Monitoring Devices
Submitted by grigby1 on Thu, 05/20/2021 - 12:16pm
medical devices
wearables security
Wearable Device
Virtualization
Ubiquitous Computing Security
Scalability
resilience
remote attacks
pubcrawl
Protocols
Pacemakers
moving target defense
virtualization privacy
IP networks
internet
Human Factors
Computer hacking
Bluetooth jamming
Biomedical monitoring
Human behavior
privacy
Metrics
composability
Resiliency
biblio
A Yoking-Proof and PUF-based Mutual Authentication Scheme for Cloud-aided Wearable Devices
Submitted by grigby1 on Thu, 05/20/2021 - 12:16pm
pubcrawl
Yoking Proof
wearables security
Wearable Device
wearable computers
Servers
Scalability
Resiliency
resilience
PUF-based
authentication
Protocols
privacy
Physical Unclonable Function
Metrics
IoT
Human behavior
Hash functions
Cloud Computing
biblio
Human EMF Exposure in Wearable Networks for Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 2:51pm
Internet of Things
wearable networks
Wearable Device
wearable antennas
UHF antennas
Specific absorption rate
Skin
Scalability
SAR
Safety
pubcrawl
on-body wearable devices
on-body wearable communications
On-body network
military communication
iobt
antenna design approaches
Internet of battlefield things
human skin surface
Human Factors
human EMF exposure
human electromagnetic field exposure effect
Guidelines
frequency 60.0 GHz
frequency 2.4 GHz
Electromagnetics
electromagnetic fields
electromagnetic field exposure effect
biomedical communication
biological effects of microwaves
average specific absorption rate
antenna radiation patterns
biblio
Continuous Authorization in Subject-Driven Data Sharing Using Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 2:57pm
Blood pressure
wearables security
subject-driven data sharing
specified context condition
shared data
policy model
personal data
personal context
data sharing
data resources
continuous authorization framework
Continuous Authorization
contextual condition
context-aware access control models
Context-aware Access
Scalability
Wearable Device
Context modeling
access control mechanisms
ubiquitous computing
data privacy
Cameras
privacy
pubcrawl
Human behavior
Resiliency
Data models
authorization
authorisation
biblio
Password Guessing Using Machine Learning on Wearables
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
pubcrawl
wearables security
wearables
Wearable Device
wearable computers
ubiquitous items
sensitive data
security purposes
security of data
security
Scalability
Resiliency
raw data
accelerometer
privacy
password guessing
machine learning algorithms
machine learning
learning (artificial intelligence)
IoT
Human behavior
health context
GPS
Bluetooth
Accelerometers
biblio
Applied Layered-Security Model to IoMT
Submitted by aekwall on Mon, 02/17/2020 - 2:56pm
layered-security
wearables security
Wearable Device
Ubiquitous Computing Security
security threats
security of data
security mechanisms
Scalability
Resiliency
pubcrawl
privacy
Metrics
Medical services
medical field
layered-security model
data privacy
IoT
IoMT
Internet of Things
internet of medical things
information security
Industries
Immune system
immune information security
Human Factors
Human behavior
healthcare industry
health care
Device-Connect-Manage
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
Inferring Mobile Payment Passcodes Leveraging Wearable Devices
Submitted by grigby1 on Wed, 01/16/2019 - 2:30pm
pubcrawl
Human behavior
Resiliency
Scalability
mobile payment passcode inference
passcode input scenarios
Wearable Device
wearables security
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
1
2
next ›
last »