Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
android encryption
biblio
Independent credible: Secure communication architecture of Android devices based on TrustZone
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
Metrics
TrustZone
TEE
smart phones
security
Scalability
Resiliency
resilience
pubcrawl
android encryption
Human behavior
Hardware
encryption
ECDH
Cryptography
computer science
computer architecture
android
biblio
Privacy-Preserving Mobile Video Sharing using Fully Homomorphic Encryption
Submitted by grigby1 on Thu, 01/28/2021 - 1:32pm
modern mobile devices
video sharing software
times people
Software
smart phones
Scalability
Resiliency
resilience
pubcrawl
privacy-preserving mobile video sharing
privacy-preserving method
android encryption
mobile computing
mobile cameras
Metrics
Human behavior
fully homomorphic encryption scheme
encryption
data privacy
Cryptography
Conferences
Cameras
biblio
LCA-ABE: Lightweight Context-Aware Encryption for Android Applications
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
Metrics
sensors
security
Scalability
Resiliency
resilience
pubcrawl
privacy
Monitoring
mobile computing
Access Control
Intelligent sensors
Human behavior
encryption
context-aware
Context modeling
Automated Secure Software Engineering
attribute-based encryption
android encryption
biblio
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
QR Code (4)
Instant messaging
Instant messaging (1)
instant messaging application security
message decryption process
message security
Metrics
pubcrawl
public key cryptography
implementation designs
QR code implementation
RSA 2048
Scalability
security
Servers
two factor authentication
two-factor authentication
Two-factor authentication (3)
Electronic mail
resilience
Resiliency
account theft
AES 128
android
android encryption
authentication
confidential messages
QR codes
electronic messaging
encryption
end-to-end encryption
Fingerprint (5)
Fingerprint recognition
Human behavior
hybrid encryption
Hybrid Encryption (2)
biblio
Profiling Vulnerabilities Threatening Dual Persona in Android Framework
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
Quadroot
IPC
Kernel
malware
managed profiles
Market research
Metrics
mobile computing
National Vulnerability Database NVD
Pingroot
profiling vulnerabilities threatening dual persona
pubcrawl
inter-process communication
resilience
Resiliency
Scalability
security of data
security threat analysis
smart phones
smartphone
Stagefright
unrestricted access
vulnerable Android versions
certificate forging
Android (operating system)
Android 5
Android for Work
Android Lollipop release
Android platform
Android security model
Android smartphones
Android vulnerabilities
Android vulnerability Website
Androids
BYOP
android encryption
checksum collisions
crafted MMS
CYOD
dual persona
EMM
encryption
FUM score
Google
GSuite
Human behavior
biblio
Android-Based Smartphone Authentication System Using Biometric Techniques: A Review
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
Face
android encryption
smartphone information leakage
performance index
mobile internet
identity authentication systems
encryption technology
Biometric Recognition
Android-based smartphone authentication system
Android-based biometric verification systems
Android OS accounts
android operation system
algorithmic framework
Metrics
biometric
biometric techniques
Scalability
Humanoid robots
Androids
Android (operating system)
Information Assurance
biometrics (access control)
authentication
smart phones
pubcrawl
Human behavior
Resiliency
feature extraction
Support vector machines
mobile computing
Cryptography
authorisation
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
prominent network interface
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
edge
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
Cryptography
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
IoT
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
biblio
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
malicious individuals
localization
indoor radio
Android app
Buildings
Columbia University dormitory
Fingerprinting
GPS signals
homo-morphic cryptographic schemes
Indoor environments
Metrics
server computation capabilities
server-side fingerprint-based indoor localization
socialist millionaire problem
unique encrypted sorting capability
Wi-Fi
Wi-Fi access points
wireless signals
android encryption
pubcrawl
Servers
Cryptography
encryption
data privacy
telecommunication security
Protocols
mobile computing
Resiliency
Human behavior
Scalability
privacy
Databases
smart phones
wireless LAN
Wireless fidelity
Homomorphic encryption
efficiency
fingerprint identification
biblio
SIMON Lightweight Encryption Benchmarking on Wireless Aquascape Preservation
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
remote Android smartphone
Arduino controller
autonomous aquascape preservation system
DS18B20 sensor
engineering technique
Human-computer interaction
instance aquascaping
leisure activities
pervasive computing
aquascape temperature
SIMON lightweight cryptography
SIMON lightweight encryption
SIMON lightweight encryption benchmarking
unauthorized party
wireless aquascape preservation system
wireless communication channel
android encryption
security of data
aquascape
Android graphical user interface application
Metrics
graphical user interfaces
communication technology
user experience
user interfaces
smart phones
pubcrawl
Human behavior
Resiliency
mobile computing
telecommunication security
Cryptography
Scalability
biblio
A New Technique for Detecting Android App Clones Using Implicit Intent and Method Information
Submitted by aekwall on Mon, 08/10/2020 - 10:32am
Metrics
android encryption
repackaged apps
online markets
method information
malicious codes
intent
implicit intents
code obfuscation techniques
Cloning
clone detection
class method
Android app clones detection
Andorid app
Code Obfuscation
Scalability
Android ecosystem
reverse engineering
Android (operating system)
Data mining
tools
pubcrawl
Human behavior
Resiliency
feature extraction
mobile computing
invasive software
malware
encryption
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »