Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
Design and Development of Collaborative Approach for Integrity Auditing and Data Recovery based on Fingerprint Identification for Secure Cloud Storage
Submitted by aekwall on Fri, 05/06/2022 - 12:50pm
Predictive Metrics
encryption audits
MD5 (Message Digest)
Integrity Auditing
fingerprint identification
cloud storage service
3DES (Triple-data Encryption Standard)
data integrity
Three-dimensional displays
security
Fingerprint recognition
Safety
Compositionality
Resiliency
pubcrawl
encryption
authentication
Cloud Computing
biblio
A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
Submitted by grigby1 on Fri, 05/06/2022 - 10:32am
resilience
secure authentication
key agreement
DNA cryptography
smart cards
mutual authentication
DNA
Mathematics
parallel processing
pubcrawl
Metrics
encoding
Protocols
privacy
authentication
Resiliency
Human behavior
biblio
SSH brute force attack mitigation in Internet of Things (IoT) network : An edge device security measure
Submitted by grigby1 on Thu, 05/05/2022 - 4:33pm
composability
Force measurement
edge detection
username
Raspberry Pi
Image edge detection
Force
password
Metrics
Intrusion Detection System (IDS)
Internet of Things
authentication
Protocols
Scalability
Resiliency
resilience
pubcrawl
Intrusion Detection
security
biblio
An Efficient Encryption-Authentication Scheme for Electrocardiogram Data using the 3DES and Water Cycle Optimization Algorithm
Submitted by grigby1 on Thu, 05/05/2022 - 3:13pm
Encryption-Authentication Scheme
Water Cycle Optimization Algorithm.
Three-dimensional displays
Sociology
Signal processing algorithms
signal processing
Resiliency
resilience
pubcrawl
3DES
encryption
Electrocardiography
efficient encryption
ECG
cyber physical systems
cyber physical system security framework
composability
authentication
biblio
Signature Verification Time Reduction for GOST Digital Signature Algorithm
Submitted by grigby1 on Tue, 04/26/2022 - 2:50pm
authentication
data integrity
digital signatures
Discrete Algorithms
GOST digital Signature Algorithms
handwriting recognition
information technology
pubcrawl
resilience
Resiliency
Scalability
Time complexity
Time measurements
biblio
Privacy-Preserving Keystroke Analysis using Fully Homomorphic Encryption amp; Differential Privacy
Submitted by grigby1 on Tue, 04/26/2022 - 11:39am
authentication
composability
Cryptography
differential privacy
fully homomorphic encryption
Human behavior
machine learning
Neural networks
privacy
pubcrawl
resilience
Resiliency
Scalability
security
tools
Training
biblio
Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems
Submitted by grigby1 on Wed, 04/20/2022 - 10:46am
machine learning
sensors
security
SCADA systems
pubcrawl
privacy preservation
privacy
perturbation
Monitoring
authentication
Human Factors
data privacy
cyber-physical systems
cyberattack
Cryptography
CPS Privacy
blockchain
biblio
Cyber-Physical-Social Aware Privacy Preserving in Location-Based Service
Submitted by grigby1 on Wed, 04/20/2022 - 10:44am
authentication
CPS-aware privacy utility maximization
CPS Privacy
data privacy
Games
Human Factors
Location-based service
Nash Equilibrium
privacy
privacy leakage
pubcrawl
Servers
biblio
Covert Channel-Based Transmitter Authentication in Controller Area Networks
Submitted by grigby1 on Tue, 04/19/2022 - 3:16pm
Manganese
Transmitters
Transmitter authentication
Throughput
Scalability
Resiliency
resilience
pubcrawl
Protocols
Monitoring
authentication
Intrusion Detection
Cyber-Physical System (CPS) security
covert channels
covert channel
Controller area network (CAN)
Compositionality
composability
Clocks
biblio
Blockchain Based Mutual Authentication for VoIP Applications with Biometric Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 1:14pm
authentication
Biological system modeling
biometrics (access control)
blockchain
blockchains
Elliptic curve cryptography
encryption
P2P network
privacy
pubcrawl
resilience
Resiliency
Scalability
secure communication
signature based defense
VoIP
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
…
next ›
last »