Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authenticity
biblio
Secure Sign: Signing Document Online
Submitted by grigby1 on Tue, 10/15/2019 - 1:45pm
secure sign
legal offices
main security goals
Metrics
online
pubcrawl
Repudiation
resilience
Resiliency
Secure
Law
SecureSign system
sign
signatories
signatory
signature
signing documents
signing parties
user fingerprint
digital signatures
authenticity
authorisation
biometric
component
composability
contracts
Cryptography
data integrity
authentication
document
document online
electronic signature tablet
face-to-face
fingerprint reader
Fingerprint recognition
fraud
Human behavior
biblio
TIGER HASH KERBEROS BIOMETRIC BLOWFISH USER AUTHENTICATION FOR SECURED DATA ACCESS IN CLOUD
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
security
Human behavior
Kerberos
Kerberos biometric blowfish user authentication
message authentication
Metrics
pubcrawl
Registration
Resiliency
secured data access
genuine user
Servers
Ticket Granting
tiger hash
Tiger Hash-based Kerberos biometric blowfish authentication
unauthorized users
user ID
user identity
users ID
cloud server
authenticated user
authentication
authentication accuracy
authentication server
authentications time
authenticity
authorisation
Blowfish encryption
Cloud Computing
Access Control
cloud services
cloud user
confidentiality rate
Cryptography
CS grants
CU
encrypted ticket
encryption
biblio
Security in Personal Genomics: Lest We Forget
Submitted by grigby1 on Fri, 09/28/2018 - 2:12pm
resilience
pubcrawl
Scalability
integrity
authenticity
digital signatures
authenticated data structures
digital signature chaining
genomic security
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 2:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
Fitness Trackers: Fit for Health but Unfit for Security and Privacy
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
security and privacy
malicious user setting
Monitoring
privacy
Protocols
pubcrawl
resilience
Resiliency
Scalability
Human behavior
Servers
smart devices market
smart phones
target tracking
vital security analysis
wearable computers
Wearable devices
wearables security
data integrity
Activity/Health data
authenticity
Cloud Computing
cloud-based services
condition monitoring
confidentiality
customers
Data integration
activity monitoring solutions
data privacy
encryption
erroneous data analytics
fitness trackers
fitness tracking products
health care
health monitoring
biblio
Confidentiality and Authenticity in a Platform Based on Network-on-Chip
Submitted by grigby1 on Wed, 02/21/2018 - 12:37pm
network performance
SoCIN-based systems
silicon overhead
Security Properties
security mechanisms
security aspects
security
Scalability
Resiliency
resilience
reference multicore platform
pubcrawl
Program processors
processing elements
networks-on-chip
network-on-chip
advanced encryption standard
network level
Network interfaces
multiprocessing systems
multicore computing security
Multicore Computing
Metrics
Many-core systems
low-cost interconnect architecture
encryption
Cryptography
confidentiality
computer architecture
authenticity
AES model
biblio
An enhanced cryptographic model based on DNA approach
Submitted by grigby1 on Tue, 01/23/2018 - 1:53pm
Asymmetric Encryption
authenticity
Ciphers
confidentiality
Cryptography
data communication
decryption
DNA
DNA computing
DNA cryptography
encryption
Human behavior
Metrics
privacy
pubcrawl
Resiliency
biblio
Development of the Hierarchal Trust Management System for Mobile Cluster-based Wireless Sensor Network
Submitted by grigby1 on Tue, 09/05/2017 - 12:49pm
Anomaly Detection
attacks
authenticity
clustering
Human behavior
Intrusion Detection
pubcrawl
Resiliency
Scalability
sensor security
trust
wireless sensor networks
« first
‹ previous
1
2