Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pattern locks
biblio
Conundrum-Pass: A New Graphical Password Approach
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
graphical password system
pattern locks
unlocking time
trivial password methodologies
textual passwords
smudge attacks
shoulder surfing
security element
pattern lock
Password Submission
Password Registration
multiple chunks
mobile computing environment
graphical passwords
Scalability
graphical password schemes
Graphical Password
external attacks
conundrum-pass
password guessing
Computer graphics
dictionary attacks
authentication
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Two Methods for Authentication Using Variable Transmission Power Patterns
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
pattern locks
Human behavior
Scalability
Resiliency
Access Control
authentication
Communication system security
Hardware
Mathematical model
power control
pubcrawl
Relays
source authentication
variable power
wireless authentication
Wireless communication
biblio
Locking Secret Data in the Vault Leveraging Fuzzy PUFs
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
physical unclonable functions
Human behavior
inherent sensitivity
locking secret data
low-cost security anchor
manufacturing variations
nanoscale variations
pattern locks
Phase measurement
helper data algorithm
prominent intrinsic PUF
Proposals
pubcrawl
Random access memory
Reliability
secret important data
secure environment
security scheme
enrollment phase
Resiliency
Metrics
Fuzzy Cryptography
aging sensitivity
Cryptography
data algorithms
DRAM chips
DRAM PUF
Scalability
error correction
error-correction algorithm
error-tolerant
fuzzy pattern
fuzzy PUF
fuzzy set theory
Hardware
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Security Lock with Effective Verification Traits
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
speech pattern recognition
multilevel security system
multiple layer security system
physical security
Raspberry Pi microcomputers
recognition
security lock
security locker solution
smart box
multi-layer
Speech recognition
TensorFlow
vein pattern recognition
vein recognition
Veins
verification traits
Viola and Jones
pattern locks
pubcrawl
Scalability
authorisation
Linux
feature extraction
learning (artificial intelligence)
machine learning
Resiliency
Human behavior
security
password
Cameras
Fingerprint recognition
face recognition
facial recognition
graphical user interfaces
interactive GUI
machine learning operations
biblio
—Multiple Cluster-Android lock Patterns (MALPs) for Smart Phone Authentication‖
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
cluster based progressive smart lock
pattern locks
Smart phone lock
smart phone authentication
smart lock facilities
smart android mobile phone
single authentication system
progressive authentication service
Pattern
multiple cluster-android lock patterns
multiple cluster based pattern match system
mobile phone user
dependent combination
Scalability
cluster
ALP
Android (operating system)
authentication
pattern matching
smart phones
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
Securing PKES against Relay Attacks using Coordinate Tracing and Multi-Factor Authentication
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
Metrics
vehicle sensors
tracing system
threats
telecommunication channels
Start System
security
Scalability
Resiliency
pubcrawl
PKES system
PKES Forcefield movement-tracing
pattern locks
passive keyless entry and start system
multifactor authentication
amplified relay attack
keys (locking)
Key Bearing algorithm
Human Factors
Human behavior
entry access system
coordinate tracing
CAR security
Bluetooth communication channel
Bluetooth
automotive electronics
automobile security
authentication
attacks
biblio
Coexistence of Intensity Pattern Types in Broadband Fourier Domain Mode Locked (FDML) Lasers
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
biomedical optical imaging
dispersion
Human behavior
human factor
Human Factors
Laser mode locking
Laser noise
Mathematical model
Optical polarization
pattern locks
pubcrawl
resilience
Resiliency
Ring lasers
Scalability
biblio
2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
Pattern
smart phones
Smart phone lock
smart phone authentication
smart lock facilities
smart android mobile phone
single authentication system
Scalability
Resiliency
resilience
pubcrawl
progressive authentication service
pattern matching
pattern locks
ALP
multiple cluster-android lock patterns
multiple cluster based pattern match system
mobile phone user
mobile computing
Human Factors
human factor
Human behavior
dependent combination
cluster based progressive smart lock
cluster
authorisation
authentication
Android (operating system)
biblio
Scaling Topology Pattern Matching: A Distributed Approach
Submitted by grigby1 on Tue, 11/26/2019 - 3:35pm
graph pattern matching
Human behavior
human factor
Human Factors
locality control
pattern locks
pubcrawl
resilience
Resiliency
Scalability
topology control
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »