Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
Design of an Automated Blockchain-Enabled Vehicle Data Management System
Submitted by grigby1 on Fri, 09/08/2023 - 10:25am
Safety
Vehicular data management
vehicle security
Automated data authentication
Human Factors
smart contracts
Internet of Vehicles
data privacy
privacy
authentication
signal processing
Resiliency
resilience
Metrics
Human behavior
pubcrawl
blockchain
security
Organizations
biblio
Multi-subject information interaction and one-way hash chain authentication method for V2G application in Internet of Vehicles
Submitted by grigby1 on Fri, 09/08/2023 - 10:24am
internet
Vehicles to Smart Grid
One-Way Hash Chain
Human Factors
Vehicle-to-grid
information processing
Reliability
real-time systems
Internet of Vehicles
computer architecture
authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
security
biblio
Anonymous Identity Authentication scheme for Internet of Vehicles based on moving target Defense
Submitted by grigby1 on Fri, 09/08/2023 - 10:24am
privacy
Vehicle-to-everything
IoV(Internet of vehicle)
Human Factors
moving target defense
anonymous authentication
vehicle dynamics
information security
Internet of Vehicles
security
authentication
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security
Submitted by grigby1 on Fri, 09/01/2023 - 2:22pm
authentication
Broadcast Authentication
authentication codes
Galois fields
Human Factors
codes
information theoretic security
Compositionality
Receivers
composability
collaboration
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
Protocols
Two way authentication
secure authentication
legitimate node
insider attacks
ElGamal encryption
passwords
location awareness
Costs
Resiliency
Elliptic curve cryptography
Policy Based Governance
insider threat
web services
Cryptography
authentication
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
biblio
Blockchain-Based Decentralized Authentication for Information-Centric 5G Networks
Submitted by grigby1 on Fri, 08/25/2023 - 10:59am
computer architecture
pubcrawl
resilience
Resiliency
Scalability
authentication
5G mobile communication
Access Control
Protocols
Information Centric Networks
computer networks
information-centric networking
biblio
Research on Information Security Protection of Industrial Internet Oriented CNC System
Submitted by grigby1 on Thu, 08/24/2023 - 3:01pm
network security
security protection scheme
information security protection
CNC system information security protection
industrial internet
Productivity
machine tools
Industrial Control Systems
Data Security
information security
industrial control system
internet
authentication
Scalability
Resiliency
resilience
pubcrawl
biblio
Blockchain-based Device Identity Management with Consensus Authentication for IoT Devices
Submitted by grigby1 on Thu, 08/17/2023 - 4:41pm
security
IoT
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
blockchain technology
Identity management
blockchains
D2D authentication
device identity management
biblio
Decentralized Identity and Access Management of Cloud for Security as a Service
Submitted by grigby1 on Thu, 08/17/2023 - 4:40pm
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
Identity management
control systems
Forensics
Data Breach
DID
blockchains
decentralized Identity
distributed ledger
Identity-Access Management
biblio
The Digital Identity Management System Model Based on Blockchain
Submitted by grigby1 on Thu, 08/17/2023 - 4:40pm
information security
blockchain
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
Data models
Identity management
Computational modeling
smart contracts
W3C
blockchains
Decentralized IDentifier
1
2
3
4
5
6
7
8
9
…
next ›
last »