Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
biomedical communication
biblio
Human EMF Exposure in Wearable Networks for Internet of Battlefield Things
Submitted by grigby1 on Tue, 11/17/2020 - 2:51pm
Internet of Things
wearable networks
Wearable Device
wearable antennas
UHF antennas
Specific absorption rate
Skin
Scalability
SAR
Safety
pubcrawl
on-body wearable devices
on-body wearable communications
On-body network
military communication
iobt
antenna design approaches
Internet of battlefield things
human skin surface
Human Factors
human EMF exposure
human electromagnetic field exposure effect
Guidelines
frequency 60.0 GHz
frequency 2.4 GHz
Electromagnetics
electromagnetic fields
electromagnetic field exposure effect
biomedical communication
biological effects of microwaves
average specific absorption rate
antenna radiation patterns
biblio
SDN\_Based Secure Healthcare Monitoring System(SDN-SHMS)
Submitted by aekwall on Mon, 10/12/2020 - 11:32am
Biomedical monitoring
Expert Systems and Privacy
security platform
security integration framework
secure Healthcare Monitoring System
SDN-SHMS
IoT-based remote health monitoring systems
IoT-based healthcare monitoring systems
HMS
geriatrics
elderly people
security concern
biomedical communication
privacy concern
patient monitoring
medical computing
Monitoring
Software Defined Network
health care
Human Factors
sensors
Mobile Applications
pubcrawl
Human behavior
software defined networking
computer architecture
security
Internet of Things
Medical services
data privacy
Scalability
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
environmental prediction
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
elliptic curve
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
privacy preservation
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
Scalability
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
biblio
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
Submitted by grigby1 on Fri, 07/24/2020 - 12:32pm
NIST curves
IoT-connected healthcare system
key policy attribute based encryption
Key Policy Attribute Based Encryption (KP-ABE)
key-policy
KP-ABE
Lightweight
lightweight key-policy attribute-based encryption scheme
Logic gates
Internet of Things (IoT)
policy-based governance
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
selective-set model
smart phones
delegation feature
Attribute-based
biomedical communication
Chosen-plaintext attack
ciphertext indistinguishability
collaboration
computer network security
cryptanalysis
decryption key
Android phone
encryption
fixed KP-ABE scheme
H-KP-ABE
health care
hierarchical
hierarchical KP-ABE
Internet of Things
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers