Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
Securing the Integrity of PDF Files using RSA Digital Signature and SHA-3 Hash Function
Submitted by aekwall on Fri, 02/04/2022 - 10:30am
verification
Repudiation
Signing
SHA-3
RSA algorithm
Portable document format
non repudiation
Keccak
file integrity
digital signature
data science
Databases
Distance measurement
public key cryptography
Hash functions
Receivers
composability
Human behavior
Resiliency
Metrics
pubcrawl
authentication
biblio
EssentialFP: Exposing the Essence of Browser Fingerprinting
Submitted by grigby1 on Mon, 01/31/2022 - 5:42pm
Compositionality
web security and privacy
Virtual assistants
Surface fitting
Information filters
Browser Fingerprinting
target tracking
Web Browser Security
Web pages
pubcrawl
JavaScript
Information Flow
Fingerprint recognition
authentication
Resiliency
resilience
Metrics
Human behavior
biblio
Press \$@\$@\$\$ to Login: Strong Wearable Second Factor Authentication via Short Memorywise Effortless Typing Gestures
Submitted by grigby1 on Mon, 01/31/2022 - 3:48pm
Browsers
Wearable Authentication
Behavioral Authentication
two factor authentication
wearables security
wearable computers
biometrics (access control)
Pins
wrist
privacy
Decision Making
authentication
Scalability
Resiliency
resilience
Human behavior
pubcrawl
biblio
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data
Submitted by grigby1 on Mon, 01/31/2022 - 3:47pm
privacy
blockchain
pubcrawl
Human behavior
resilience
Resiliency
Scalability
authentication
Access Control
Medical services
Prototypes
Internet-of-Things
Pandemics
wearable computers
wearables security
Medical wearable devices
biblio
A Three-Party Mutual Authentication Protocol for Wearable IOT Health Monitoring System
Submitted by grigby1 on Mon, 01/31/2022 - 3:46pm
authentication
WIHMS
Three-Party
Internet of Things(IoT)
wearables security
wearable computers
wearable sensor
mutual authentication
Databases
Protocols
Internet of Things
Scalability
performance evaluation
Resiliency
resilience
Human behavior
pubcrawl
security
privacy
biblio
Engineering Adaptive Authentication
Submitted by grigby1 on Tue, 01/25/2022 - 4:51pm
adaptive systems
security
pubcrawl
resilience
Resiliency
Conferences
authentication
Object recognition
composability
Decision Making
Context
navigation
Autonomic Security
Adaptive Authentication
authentication method
Requirements
biblio
Lightweight and Reconfigurable Security Architecture for Internet of Things devices
Submitted by grigby1 on Tue, 01/25/2022 - 4:49pm
IoT
Resiliency
resilience
PUF
pubcrawl
Protocols
Physical Unclonable Function
ML attack
machine learning
Resilient Security Architectures
Internet of Things
FPGA
Cybersecurity
Conferences
computer architecture
composability
Autonomic Security
authentication
biblio
A Trusted Data Storage and Access Control Scheme for Power CPS Combining Blockchain and Attribute-Based Encryption
Submitted by aekwall on Tue, 01/25/2022 - 3:55pm
attribute-based encryption
authentication
Conferences
Access Control
pubcrawl
Scalability
Human behavior
blockchain
cyber-physical systems
policy-based governance
control systems
Costs
cyber-physical system (CPS)
Memory
Multi-authority
biblio
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid
Submitted by aekwall on Tue, 01/25/2022 - 3:54pm
data privacy
attribute-based encryption
authentication
real-time systems
Conferences
pubcrawl
Scalability
Human behavior
policy-based governance
power system stability
Stability analysis
Attribute based signcryption
Decentralized attribute based encryption
Smart Grid
supply and demand
biblio
Spoofed Voice Detection using Dense Features of STFT and MDCT Spectrograms
Submitted by aekwall on Tue, 01/25/2022 - 3:50pm
CNN
STFT
spoofed voices
spectrum
recognition
MDCT
Hann window
Fourier transforms
attestation
Forensics
Speech recognition
Forgery
discrete cosine transforms
composability
Human behavior
Resiliency
pubcrawl
feature extraction
authentication
« first
‹ previous
…
15
16
17
18
19
20
21
22
23
…
next ›
last »