Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
Submitted by grigby1 on Fri, 07/29/2022 - 9:04am
Smart Grid
power grid vulnerability analysis
session key
trusted authority
key agreement
secure communication
Metrics
Smart Grids
Wireless communication
smart meters
tools
Protocols
authentication
Scalability
Resiliency
resilience
pubcrawl
security
privacy
biblio
A novel Two-Factor HoneyToken Authentication Mechanism
Submitted by aekwall on Thu, 07/14/2022 - 4:17pm
security
Cryptography
password
internet
authentication
pubcrawl
Resiliency
Prototypes
cyber-physical systems
Mobile handsets
two factor authentication
QR codes
honeywords
biblio
An Image Watermarking based on Multi-level Authentication for Quick Response Code
Submitted by aekwall on Thu, 07/14/2022 - 4:15pm
codes
QR codes
watermark recovery
tempered image
QR code image
multi-level authentication
digital watermarking
location awareness
scientific computing
Watermarking
cyber-physical systems
Hash functions
Resiliency
pubcrawl
authentication
Software
security
Cryptography
biblio
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees
Submitted by grigby1 on Wed, 07/13/2022 - 1:11pm
pubcrawl
Resiliency
authentication
Cryptography
Protocols
Elliptic curve cryptography
resilience
Scalability
Elliptic curves
Identity-based encryption
elliptic curve
Galois fields
exponentiation
final exponentiation
pairing-based cryptography
biblio
A Creation Cryptographic Protocol for the Division of Mutual Authentication and Session Key
Submitted by grigby1 on Tue, 07/12/2022 - 3:23pm
Cryptographic Protocols
authentication and session key
policy governance
cryptology
Algorithm
Asymmetric
Communications technology
information science
standards
Compositionality
Cryptography
Metrics
composability
authentication
Safety
Resiliency
resilience
pubcrawl
Monitoring
collaboration
biblio
Doodling Based CAPTCHA Authentication System
Submitted by grigby1 on Thu, 06/30/2022 - 1:17pm
Technological innovation
video
Turing test
generic system
voice recognition
Limiting
image recognition
web security
attacks
CAPTCHA
captchas
CNN
image
face recognition
Portable computers
composability
Computers
internet
authentication
Human behavior
pubcrawl
machine learning
biblio
Securing mHealth Applications with Grid-Based Honey Encryption
Submitted by grigby1 on Tue, 06/14/2022 - 3:15pm
Metrics
privacy and security
password-based authentication
mobile healthcare
mhealth
honey encryption
grid-based authentication
biometrics (access control)
biometric encryption
Force
pubcrawl
malware
Industries
Medical services
Biological system modeling
authentication
Scalability
Resiliency
resilience
biblio
Privacy-Preserving Biometric-based Authentication Scheme for Electric Vehicles Charging System
Submitted by grigby1 on Tue, 06/14/2022 - 3:15pm
Metrics
IRIS datasets
electric vehicle
Charging Systems
authentication system
electric vehicle charging
Costs
biometric encryption
Oils
KNN
encryption
Databases
privacy
authentication
Scalability
Resiliency
resilience
pubcrawl
search problems
biblio
Method of Biometric Authentication with Digital Watermarks
Submitted by grigby1 on Tue, 06/14/2022 - 3:13pm
Biological system modeling
watermarks
biometric authentication
certification authority
biometric encryption
Watermarking
Metrics
Fingerprint recognition
fingerprint
encryption
Data models
authentication
Scalability
Analytical models
Resiliency
resilience
pubcrawl
biblio
A New Framework for Secure Biometric Data Transmission using Block-wise Reversible Data Hiding Through Encryption
Submitted by grigby1 on Tue, 06/14/2022 - 3:13pm
Metrics
image security
image decryption
face image
biometric data transmission
fingerprint image
biometrics (access control)
image encryption
biometric encryption
face recognition
encryption
Fingerprint recognition
authentication
Scalability
Resiliency
resilience
pubcrawl
feature extraction
Cloud Computing
« first
‹ previous
…
8
9
10
11
12
13
14
15
16
…
next ›
last »