Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
key generation
encryption system
Dynamic Key
random key generation
Resiliency
Iris
biometrics
randomness
Image color analysis
Mathematics
encryption
resilience
NIST
authentication
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
Cloud Computing
biblio
EMG Data Collection for Multimodal Keystroke Analysis
Submitted by grigby1 on Fri, 03/03/2023 - 5:18pm
Data collection
pubcrawl
Human behavior
Metrics
Software
authentication
Protocols
Keyboards
biometrics (access control)
biometrics
keystroke analysis
data post-processing
electromyography
EMG
Myo armband
biblio
Analysing keystroke dynamics using wavelet transforms
Submitted by grigby1 on Fri, 03/03/2023 - 5:18pm
feature extraction
pubcrawl
Human behavior
Metrics
security
authentication
surveillance
wavelet transforms
wavelet analysis
keystroke analysis
passwords
keystroke dynamics
feature-extraction
keystroke-dynamics
wavelets
biblio
Keystroke Dynamics based User Authentication using Deep Learning Neural Networks
Submitted by grigby1 on Fri, 03/03/2023 - 5:17pm
Neural networks
pubcrawl
Human behavior
Metrics
security
authentication
user authentication
Industries
Time series analysis
Three-dimensional displays
convolutional neural networks
keystroke analysis
passwords
keystroke dynamics
Behavioral biometrics
biblio
A Secure mechanism to protect UAV communications
Submitted by grigby1 on Fri, 03/03/2023 - 5:17pm
control systems
kerberos security
UAV Communication Network
Kerberos
Internet security
Internet of drones
uav
distributed systems
Intelligent systems
Access Control
smart cities
Internet of Things
Cryptography
authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
biblio
Proposal of HMAC based Protocol for Message Authenication in Kerberos Authentication Protocol
Submitted by grigby1 on Fri, 03/03/2023 - 5:16pm
telecommunication traffic
kerberos security
symmetric cryptography
Key Distribution System
codes
unauthorized access
HMAC
Electronic mail
Public key
Servers
Protocols
authentication
message authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
SOAP messaging to provide quality of protection through Kerberos Authentication
Submitted by grigby1 on Fri, 03/03/2023 - 5:16pm
Phishing
kerberos security
Kerberos authentication
passwords
Retina
web security
XML
service oriented architecture
Multi-factor authentication
pubcrawl
SOAP
Protocols
web services
authentication
Resiliency
resilience
Metrics
Human behavior
biblio
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services
Submitted by grigby1 on Fri, 03/03/2023 - 12:16pm
Compositionality
SIM card based authentication
mobile network operator
cellular network
passwords
iOS Security
Mobile Security
fault diagnosis
Pipelines
malware
security
Registers
Cellular networks
authentication
Resiliency
resilience
Metrics
Human Factors
pubcrawl
biblio
HERMS: A Hierarchical Electronic Records Management System Based on Blockchain with Distributed Key Generation
Submitted by aekwall on Fri, 03/03/2023 - 10:51am
Generators
Hierarchical Identity-Based Cryptosystem
Electronic Records Management
Distributed Key Generation
key management
service computing
Costs
Memory management
blockchains
blockchain
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Protocols
authentication
biblio
Reinforcement of IoT Open Platform Security using PUF -based Device Authentication
Submitted by grigby1 on Tue, 02/28/2023 - 5:50pm
Internet of Things
security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
PUF
authentication
IoT security
information and communication technology
composability
convergence
Physical Unclonable Function
device authentication
IoT Open Platform
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »