Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication
biblio
A nodal Authentication IoT Data Model for Heterogeneous Connected Sensor Nodes Within a Blockchain Network
Submitted by aekwall on Fri, 09/30/2022 - 2:45pm
Human behavior
nodal authentication
IoT Data Security
Heterogeneous systems
data integrity
Data Security
IoT security
public key cryptography
composability
Data models
Resiliency
Metrics
pubcrawl
Protocols
authentication
data privacy
blockchain
biblio
Decentralizing Identity Management and Vehicle Rights Delegation through Self-Sovereign Identities and Blockchain
Submitted by aekwall on Fri, 09/30/2022 - 2:38pm
blockchain
X.509 certificates
vehicles
Self-Sovereign Identities
Atmospheric measurements
decentralization
Particle measurements
Identity management
blockchains
Software
Human behavior
Resiliency
pubcrawl
Conferences
authorization
Scalability
authentication
biblio
Non-Invertibility for Random Projection based Biometric Template Protection Scheme
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
pubcrawl
Metrics
resilience
Scalability
authentication
Cryptography
information management
biometrics (access control)
Resiliency
biometric template protection
discriminability
fuzzy commitment
non-invertibility
random projection
Fuzzy Cryptography
biblio
A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT
Submitted by grigby1 on Fri, 09/16/2022 - 4:47pm
OLSR routing algorithm
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Pseudo random numbers
Pollard’s ρ
Fuzzy Cryptography
Metrics
Medical services
Internet-of-Medical Things
Fuzzy logic
Elliptic curve cryptography
data privacy
Blackhole attack
authentication
biblio
An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
Fuzzy Cryptography
authentication
Cloud Computing
Costs
Fog computing
key management
Mobile handsets
ProVerif
pubcrawl
resilience
Resiliency
Resists
Scalability
security
security issues
Servers
biblio
A Lightweight Authentication and Key Agreement Protocol for Secure Fog-to-Fog Collaboration
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
computer architecture
collaboration
security
IoT
pubcrawl
resilience
Conferences
performance evaluation
Scalability
authentication
Protocols
Fog computing
AVISPA
Internet security
Resiliency
authentication protocol
biblio
Stylometric Analysis of Writing Patterns Using Artificial Neural Networks
Submitted by grigby1 on Fri, 09/09/2022 - 2:27pm
Training
pubcrawl
Human behavior
Metrics
authentication
Computational modeling
natural language processing
artificial neural network
Artificial Neural Networks
Plagiarism
Technological innovation
stylometry
Writing
author authentication
biblio
Subject Authentication using Time-Frequency Image Textural Features
Submitted by grigby1 on Fri, 09/09/2022 - 2:22pm
AI
Wavelet domain
PPG
CWT
Continuous wavelet transforms
Fingers
Resiliency
Time Frequency Analysis
image segmentation
security
Time-frequency Analysis
face recognition
resilience
authentication
Scalability
Metrics
pubcrawl
biblio
A Systematic Security Design Approach for Heterogeneous Embedded Systems
Submitted by aekwall on Fri, 08/26/2022 - 12:22pm
security
embedded systems
Hardware
IoT
Internet of Things
authentication
Conferences
pubcrawl
Metrics
Resiliency
composability
Systematics
CPS
hardware-software co-design
heterogeneity
security design
biblio
vProfile: Voltage-Based Anomaly Detection in Controller Area Networks
Submitted by aekwall on Fri, 08/26/2022 - 11:56am
automotive
side-channel
Controller area network (CAN)
Production
Electric potential
Interference
Fingerprint recognition
cyber-physical systems
controller area network security
security
Internet of Things
Resiliency
pubcrawl
Wireless communication
Anomaly Detection
Intrusion Detection
authentication
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »