Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
A Secure Mobile Payment Protocol for Handling Accountability with Formal Verification
Submitted by grigby1 on Thu, 02/24/2022 - 12:30pm
information security
Transaction Security
tools
security
Scyther tool
pubcrawl
Protocols
protocol verification
privacy
policy-based collaboration
Payment Protocol
Online banking
Mobile payment systems
Metrics
Industries
Cryptography
Compositionality
composability
collaboration
AVISPA tool
authorization
authentication
accountability
network accountability
Resiliency
biblio
Cryptocurrencies with Security Policies and Two-Factor Authentication
Submitted by grigby1 on Thu, 02/24/2022 - 12:20pm
two factor authentication
authentication
Banking
blockchain
blockchains
Costs
cryptocurrencies
Cryptography
Hardware
Human behavior
performance evaluation
Privacy Policies
pubcrawl
Scalability
smart contracts
biblio
ONU Authentication Method Based on POTS Key Matching
Submitted by grigby1 on Thu, 02/10/2022 - 3:19pm
POTS
ONU
matching
key
authentication
biblio
A Hybrid Encryption Approach for Secured Authentication and Enhancement in Confidentiality of Data
Submitted by grigby1 on Thu, 02/10/2022 - 3:19pm
honey
Homomorphic
encryption
digital communication
Data Security
confidentiality
authentication
biblio
Integrity and Authentications for service security in vehicular ad hoc networks (VANETs): A Review
Submitted by grigby1 on Tue, 02/08/2022 - 11:40am
Compositionality
RSU
open access
V2V
integrity
manet privacy
human computer interaction
vehicular ad hoc networks
uncertainty
security
VANETs
composability
privacy
authentication
Resiliency
resilience
Metrics
pubcrawl
biblio
Securing IoT Enabled RFID Based Object Tracking Systems: A Symmetric Cryptography Based Authentication Protocol for Efficient Smart Object Tracking
Submitted by grigby1 on Fri, 02/04/2022 - 2:52pm
radio frequency identification
RFIDs
Supply Chain Management (SCM)
supply chain management
Strong Authentication and Strong Integrity (SASI)
ProVerif
human behaviors
object tracking
RFID
tools
Protocols
privacy
authentication
Resiliency
resilience
Human behavior
pubcrawl
Internet of Things
biblio
A Lightweight Integrity Authentication Approach for RFID-enabled Supply Chains
Submitted by grigby1 on Fri, 02/04/2022 - 2:51pm
radio frequency identification
RFIDs
Tag Detection
Authentication Chain
human behaviors
Writing
supply chains
RFID
Sociology
pubcrawl
Probabilistic logic
Prototypes
authentication
performance evaluation
Resiliency
resilience
Human behavior
biblio
Twine Stack: A Hybrid Mechanism Achieving Less Cost for Return Address Protection
Submitted by grigby1 on Fri, 02/04/2022 - 2:49pm
Hardware
Table lookup
shadow stack
Runtime
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
resilience
programming
message authentication code
rop attacks
Costs
codes
authentication
Human Factors
composability
Scalability
Resiliency
pubcrawl
biblio
Incremental code updates exploitation as a basis for return oriented programming attacks on resource-constrained devices
Submitted by grigby1 on Fri, 02/04/2022 - 2:48pm
IoT
Scalability
rop attacks
return-oriented programming
Return Oriented Programming (ROP)
return oriented programming
Resiliency
resilience
pubcrawl
Power demand
Information Reuse
Incremental Code Update
Human Factors
Generators
encryption
Computer crime
composability
codes
authentication
security
biblio
Anonymous Authentication Protocol for Efficient Communications in Vehicle to Grid Networks
Submitted by aekwall on Fri, 02/04/2022 - 10:31am
attacks
Repudiation
X.509 PKI
Vehicle-to-grid
Vehicle to Grid
security requirements
ISO standards
ISO 15118 Standard
data integrity
simulation
composability
Human behavior
Resiliency
Metrics
pubcrawl
Protocols
authentication
Computational modeling
« first
‹ previous
…
14
15
16
17
18
19
20
21
22
…
next ›
last »