Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 7:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
biblio
Extending Extensible Authentication Protocol over IEEE 802.15.4 Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:55pm
IEEE 802.15.4 networks
Zigbee
wireless LAN
Servers
security
Protocols
Payloads
Local area networks
IoT networks
Internet of Things
internet
802.1X
IEEE 802.15.4
IEEE 802.15 Standards
extensible authentication protocol
EAP
Cryptographic Protocols
computer network security
authorization
authorisation
authentication
access control functionality
biblio
GD2SA: Geo detection and digital signature authorization for secure accessing to cloud computing environments
Submitted by BrandonB on Mon, 05/04/2015 - 1:52pm
Geo-Detection
Virtualization
virtualisation
user authentication
security
secure access
Second Verification
Reliability
internet
authentication
geo detection
GD2SA
digital signatures
digital signature authorization
Computational modeling
Cloud Computing
authorization
authorisation
biblio
A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme
Submitted by BrandonB on Mon, 05/04/2015 - 1:49pm
Mobile communication
telecommunication security
security
secure authentication procedure
proxy mobile IPv6
Protocols
PMIPV6 based network mobility scheme
network mobility
NEMO
MR
mobility management (mobile radio)
mobile router
mobile platforms
mobile computing
AAA servers
mobile access gateway
MAG
LMAIFPNEMO
lightweight mutual authentication mechanism
Internet access
IFP-NEMO protocol
Handover
AVISPA software
AVISPA
automated validation of internet security protocols and applications
authentication authorization and accounting
authentication
biblio
Towards Secure and Dependable Authentication and Authorization Infrastructures
Submitted by BrandonB on Mon, 05/04/2015 - 1:47pm
intrusion-tolerant replication
untrusted gateways
trusted components
software fault tolerance
Servers
security
resilience architecture
RADIUS
Public key
Protocols
OpenID
Logic gates
IT infrastructures
authentication
intrusion tolerance
fault-free executions
enterprise environments
diverse computing environments
dependability
authorization infrastructures
authorisation
authentication security
authentication infrastructures
authentication dependability
authentication and authorization services
biblio
MR-TRIAGE: Scalable multi-criteria clustering for big data security intelligence applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:33pm
MapReduce
threat level
situational understanding
security events
security data mining
security companies
security
scalable multicriteria data clustering
scalable graph clustering algorithms
scalable data summarisation
Prototypes
pattern clustering
parallel algorithms
Open wireless architecture
multicriteria evaluation techniques
MR-TRIAGE workflow
Algorithm design and analysis
large security datasets
large security data sets
Internet attacks
graph theory
Electronic mail
distributed algorithms
Data mining
Computer crime
computational complexity
commodity hardware
Clustering algorithms
Big Data security intelligence applications
Big Data
attack attribution
biblio
Security configuration analytics using video games
Submitted by BrandonB on Mon, 05/04/2015 - 1:26pm
security of data
NetMaze
network configuration verification problem
network topology
provable mapping
provable verification
security
Security analysis
security configuration analytics
security configuration settings
Human Factors
security property
simulation tool
special languages
specification languages
system robustness
Topology
user interfaces
video games
Vulnerability
crowdsourcing
attack analysis
attack attribution
Communication networks
Computational modeling
computer games
computing systems
Conferences
configuration conflict
courseware
3D game object
educational software
formal methods
formal verification
game educational value
game interface
gameplay scenario
Games
human factor
biblio
A challenge of authorship identification for ten-thousand-scale microblog users
Submitted by BrandonB on Mon, 05/04/2015 - 1:23pm
Internet security issues
Twitter
Training
ten-thousand-scale microblog users
social networking (online)
security of data
security
microblog texts
microblog
authorship attribution
internet
Distance measurement
Computers
Blogs
Big Data
authorship identification
authorship detection
biblio
Anonymity, unlinkability and unobservability in mobile ad hoc networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:13pm
telecommunication network topology
public-private key pairs
route discovery process
Routing
Routing protocols
routing schemes
secure communications
security
security attacks
public key cryptography
telecommunication security
unlinkability
unobservability
user privacy
USOR
wired networks
Wireless communication
Ad hoc networks
private key cryptography
ns2
mobile ad hoc networks
ID based encryption scheme
group signature scheme
dynamic topology
cryptosystems
Cryptography
cooperative communication
cooperative algorithms
Communication system security
centralized monitoring
AODV
anonymous routing
anonymity
biblio
PADAVAN: Privacy-Aware Data Accumulation for Vehicular Ad-hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 12:58pm
privacy-aware data accumulation
Vehicular Communication
vehicular ad-hoc networks
vehicular ad hoc networks
vehicles
VANET
telecommunication security
submitted data privacy protection
sensors
security
anonymity
privacy
PADAVAN
Junctions
data privacy
data consumer
Data collection
authentication
anonymous data collection scheme
anonymous authentication scheme
« first
‹ previous
…
426
427
428
429
430
431
432
433
434
…
next ›
last »