Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
end-to-end encryption
biblio
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
QR Code (4)
Instant messaging
Instant messaging (1)
instant messaging application security
message decryption process
message security
Metrics
pubcrawl
public key cryptography
implementation designs
QR code implementation
RSA 2048
Scalability
security
Servers
two factor authentication
two-factor authentication
Two-factor authentication (3)
Electronic mail
resilience
Resiliency
account theft
AES 128
android
android encryption
authentication
confidential messages
QR codes
electronic messaging
encryption
end-to-end encryption
Fingerprint (5)
Fingerprint recognition
Human behavior
hybrid encryption
Hybrid Encryption (2)
biblio
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
End user Studies
Security by Default
User Perception
usable security and privacy
skilled attackers
signal protocol
secure messaging
pre-MME
pre-mass messenger encryption
post-MME
post-mass messenger encryption
Mental model
HCI
end-to-end encryption
Scalability
communication model
cognitive science
end-to-end security
whatsapp
authentication
Interviews
electronic messaging
pubcrawl
Resiliency
Protocols
data privacy
encryption
Cryptography
biblio
Recognizing Email Spam from Meta Data Only
Submitted by grigby1 on Mon, 02/10/2020 - 11:18am
meta data features
unsolicited e-mail
static set
spam detection approach
spam detection
spam classifiers
Scalability
pubcrawl
pattern classification
Metrics
Cryptography
meta data
Human Factors
Human behavior
feature extraction
engineered features
end-to-end encryption
encrypted emails
email spam
CSDMC2010 dataset
biblio
A privacy-aware distributed software architecture for automation services in compliance with GDPR
Submitted by grigby1 on Mon, 01/21/2019 - 12:17pm
privacy-aware software architecture
human-centric automation
human-machine collaboration
Law
legal regulation
legislation
Metrics
privacy
privacy breach protection
Privacy policy analysis for digital ecosystems
privacy-aware distributed software architecture
human behaviour analysis
pubcrawl
Resiliency
robots
secure communication
Security and Privacy in Digital Ecosystems
Software Architecture
virtualisation
virtualization privacy
virtualization techniques
distributed processing
authorisation
authorization
automation
automation services
Automation systems
composability
Cryptography
data breaches
Data protection
Databases
ART
distributes services
encryption
end-to-end encryption
EU citizens
factory automation
factory domain
GDPR compliance
General Data Protection Regulation
Human behavior
biblio
Is Bob Sending Mixed Signals?
Submitted by grigby1 on Wed, 11/28/2018 - 1:58pm
anonymous messaging
end-to-end encryption
pubcrawl
resilience
Resiliency
Scalability
secure communication
biblio
A privacy-preserving homomorphic encryption scheme for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 6:36pm
hop-by-hop encryption
smart things
sensors
secure cooperation
secret sharing
Scalability
resource constrained devices
Resiliency
pubcrawl
privacy homomorphism
Metrics
Logic gates
IoT
Internet of Things
Human Factors
Additives
Homomorphic encryption
heterogeneous smart things
fully additive secret sharing
fully additive encryption
end-to-end encryption
encryption
Elliptic curves
elliptic curve
disruptive paradigm
data concealment
data analysis module
Cryptography
context-aware decision mechanisms
ambient environment
biblio
Content-based Security for the Web
Submitted by grigby1 on Mon, 09/11/2017 - 2:18pm
Asymmetric Encryption
Browser Security
content-based security
end-to-end encryption
Human behavior
pubcrawl
Resiliency
Scalability
web security
biblio
Content-based Security for the Web
Submitted by grigby1 on Fri, 08/18/2017 - 2:18pm
content-based security
end-to-end encryption
Human behavior
key management
Metrics
pubcrawl
Resiliency
Scalability
web security