Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptography
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 12:38pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
Design and implementation of a mobile VoIP system on Android
Submitted by BrandonB on Mon, 05/04/2015 - 12:37pm
Mobility
VoIP service
VoIP
true mid-call mobility
sockets
socket communications
smart phones
signaling procedure
Servers
Protocols
pre-call mobility
Peer-to-peer computing
peer entity
moving users
mobility management (mobile radio)
android
mobile VoIP system
mobile users
IP networks
Internet telephony
in band signaling
graphical user interfaces
encryption
DNS
Cryptography
buffering techniques
ASP technology
Androids
Android devices
Android (operating system)
biblio
Cryptographic key generator candidates based on smartphone built-in sensors
Submitted by BrandonB on Mon, 05/04/2015 - 12:35pm
Android (operating system)
Android-based smartphones
Ciphers
cryptographic key generator candidates
cryptographic system
Cryptography
encryption
Generators
random number generation
random number generators
Random sequences
RNG
sensors
smart phones
smartphone
smartphone built-in sensors
biblio
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 12:30pm
cryptographic misuse vulnerability model
Vulnerability
static analysis
Runtime
prototype tool crypto misuse analyser
program diagnostics
Modelling Analysis
Humanoid robots
encryption
Cryptography
Analytical models
cryptographic misuse autodetection
Cryptographic Misuse
cryptographic API
CMA
application program interfaces
Androids
Android application
Android (operating system)
android
biblio
Analysis on Password Protection in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 12:26pm
leakage
vulnerability analyzing method
Vulnerability
user privacy
taint analysis
smart phones
PW Exam
privacy
password protection
password leakage
password
mobile computing
Android applications
Humanoid robots
encryption
decompile step
data privacy
cryptography misuse detection
cryptography misuse analysis
Cryptography
API call record
Androids
Android apps
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 12:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)
biblio
Achieving privacy preservation in WiFi fingerprint-based localization
Submitted by BrandonB on Mon, 05/04/2015 - 12:23pm
location privacy
wireless LAN
WiFi fingerprint-based localization
smart phones
signal strengths
Servers
real-world environments
PriWFL
privacy-preserving WiFi fingerprint localization scheme
privacy
performance enhancement algorithm
mobile computing
Accuracy
localization service provider
indoor mobility prediction
indoor localization
IEEE 802.11 Standards
Homomorphic encryption
Databases
data privacy
Cryptography
computer network security
computational overhead reduction
Android smartphone
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 12:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity
biblio
Effective personalized mobile search using KNN
Submitted by BrandonB on Mon, 05/04/2015 - 12:20pm
KNN
Vectors
user preferences
user preference privacy
Servers
search engines
personalized mobile search
personalization
pattern classification
Ontology
Ontologies
mobile search engine
mobile computing
Mobile communication
location search
Android based mobile
k nearest neighborhood
information retrieval
encryption techniques
data privacy
data maintaining security
Cryptography
concept extraction
concept
client-server systems
client-server architecture
clickthrough data
Classification algorithms
classification
Androids
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 12:19pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
« first
‹ previous
…
158
159
160
161
162
163
164
165
166
next ›
last »