Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT environments
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
LPA-SDP: A Lightweight Privacy-Aware Service Discovery Protocol for IoT Environments
Submitted by aekwall on Mon, 12/21/2020 - 1:27pm
service discovery
ubiquitous data access
resource-constrained environments
resource discovery protocols
resource directory
privacy consideration
manual discovery
LPA-SDT
LPA-SDP
lightweight privacy-aware service discovery protocol
IoT deployments
battlefields
Resiliency
IoT
CoAP
resource-constrained devices
IoT environments
ubiquitous computing
Healthcare
6LoWPAN
privacy
Protocols
composability
pubcrawl
Internet of Things
data privacy
biblio
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
Submitted by aekwall on Mon, 10/19/2020 - 12:07pm
outsourcing
KP-ABE
Key Policy Attribute Based Encryption (KP-ABE)
secured fine-grained selective access
outsourced cloud data
key-policy attribute-based encryption (KP-ABE)
fine-grain access control system
data users
cloud repositories
data management
IoT environments
fine-grained access control
smart contract
Cloud Computing
Data Transmission
blockchain
pubcrawl
Resiliency
Internet of Things
data privacy
Access Control
encryption
data owners
Cryptography
authorisation
Scalability
biblio
Blockchain Solutions for Forensic Evidence Preservation in IoT Environments
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
forensic evidence
Smart homes
Cyber-security
contracts
IoT environments
IoT networks
blockchain-based solution
digital forensic evidence
digitally handling forensic evidence
security services
forensic evidence preservation
Internet service providers
law enforcement agencies
permissioned blockchain
private forensic evidence database
smart home domain
Repudiation
cyber-attacks
IoT devices
high-level architecture
Resiliency
Human behavior
pubcrawl
composability
Metrics
blockchain
Internet of Things
Forensics
Digital Forensics
cryptocurrencies
Distributed databases
Intrusion Detection
smart contracts
smart phones
biblio
TCP/IP and ICN Networking Technologies for the Internet of Things: A Comparative Study
Submitted by aekwall on Mon, 01/13/2020 - 12:05pm
caching
TCPIP
TCP/IP stack
TCP/IP
packet level security
naming
IP-based technologies
IoT requirements
IoT environments
interconnecting resource-constrained devices
information-centric networks
information-centric networking paradigm
ICN networking technologies
communication paradigms
computer network security
Low-Power and Lossy Networks
6LoWPAN
Routing protocols
internet
composability
pubcrawl
Resiliency
transport protocols
computer architecture
IoT applications
security
Internet of Things
IP networks
biblio
Architecture for security monitoring in IoT environments
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
IoT
architecture
composability
computer network security
Data collection
data exchange
electronic data interchange
embedded systems
Human behavior
Human Factors
image sensors
innovative topology paradigm
Internet of Things
Internet-of-Things
video surveillance technology
IoT environments
IoT security
IoT technology
Metrics
Monitoring
network topology
pubcrawl
Resiliency
security issue
security monitoring
telecommunication network topology
video data transmission
video surveillance