Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
Multi-factor Biometric Authentication Approach for Fog Computing to ensure Security Perspective
Submitted by grigby1 on Wed, 03/09/2022 - 1:39pm
Metrics
Theft Attacks
decoy technique
Data Security Analysis
Bio-Metric Authentication Technique
biometrics (access control)
Fog computing
Cloud Security
multifactor authentication
Scalability
Cloud Computing
Computational modeling
Biological system modeling
authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
security
biblio
Secure Authentication using Zero Knowledge Proof
Submitted by grigby1 on Wed, 03/09/2022 - 1:39pm
privacy
Zero Knowledge Proof (ZKP)
zero knowledge proof
SRP
Technological innovation
Multi-factor authentication
multifactor authentication
Metrics
Data Security
Cryptography
authentication
AES
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
encryption
biblio
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems
Submitted by aekwall on Tue, 03/01/2022 - 4:32pm
authentication
blockchain technology
blockchains
composability
encoding
encryption
Metrics
network accountability
privacy
pubcrawl
Resiliency
security
SIP protocol
smart contracts
Voice over IP (VoIP)
biblio
Blockchain Based Vehicle Authentication Scheme for Vehicular Ad-hoc Networks
Submitted by aekwall on Tue, 03/01/2022 - 4:31pm
authentication
blockchain
composability
Conferences
information sharing
Intelligent vehicles
Metrics
network accountability
privacy
pubcrawl
real-time systems
Resiliency
RSU- based approach
VANET
vehicular ad hoc networks
biblio
Accountable and privacy-aware flexible car sharing and rental services
Submitted by aekwall on Tue, 03/01/2022 - 4:31pm
Access Control
accountability
authentication
authorization
automobiles
composability
Metrics
network accountability
privacy
Protocols
pubcrawl
Resiliency
security
smart cities
Transportation
V2X
biblio
A Secure Access and Accountability Framework for Provisioning Services in Named Data Networks
Submitted by aekwall on Tue, 03/01/2022 - 4:30pm
Metrics
Web and internet services
smart contracts
smart contract
Resiliency
pubcrawl
network architecture
network accountability
named data networking
Access Control
internet
handwriting recognition
data encryption
composability
blockchain
authentication
accountability
biblio
A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
Submitted by aekwall on Fri, 02/25/2022 - 10:44am
privacy
performance evaluation
authentication
Protocols
pubcrawl
Resiliency
Internet of Things
Industries
Compositionality
Predictive Metrics
provable security
Elliptic curves
Computers
Bilinear Pairing
identity authentication
Key exchange
biblio
A Secure Channel Established by the PF-CL-AKA Protocol with Two-Way ID-based Authentication in Advance for the 5G-based Wireless Mobile Network
Submitted by aekwall on Fri, 02/25/2022 - 10:43am
Compositionality
provable security
two-way identity-based authentication in advance
provable secure in Lippold model
pairing-free certificateless authenticated key agreement (PF-CL-AKA) protocol
fully secure channel
5G-based wireless mobile network
Predictive Metrics
Communication system security
quality of service
Resiliency
pubcrawl
Wireless communication
Analytical models
Protocols
authentication
data communication
biblio
Formal Verification of 5G EAP-AKA Protocol
Submitted by grigby1 on Thu, 02/24/2022 - 12:31pm
composability
pubcrawl
ProVerif
protocol verification
Protocols
privacy
policy-based collaboration
model checking
formal verification
Compositionality
5G EAP-AKA
Communications technology
collaboration
codes
authentication protocol
authentication
applied Pi-Calculus
Analytical models
5g network
5G mobile communication
biblio
Formal Verification of Secure Forwarding Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 12:31pm
Network-Security
Veins
Security-Protocols
pubcrawl
protocol verification
Protocols
privacy
policy-based collaboration
parametrized-verification
network topology
authentication
Isabelle/HOL
Formal-Verification
data-plane
computer architecture
Compositionality
composability
collaboration
autonomous systems
authorization
« first
‹ previous
…
13
14
15
16
17
18
19
20
21
…
next ›
last »