Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
KP-ABE Based Verifiable Cloud Access Control Scheme
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
mobile internet
XACML policy
XACML
verifiable computation
user private key revocable key policy attribute based encryption scheme
Scalability
public verifiable computation protocol
public verifiable cloud access control scheme
Public key
pubcrawl
private key cryptography
policy-based governance
nonmonotonic access structure
Access Control
mobile devices
mobile computing
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Games
encoding
collaboration
Cloud Computing
authorization policy
authorisation
biblio
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization
Submitted by grigby1 on Thu, 07/09/2020 - 12:58pm
Security Properties
Human behavior
Human Factors
mobile client
mobile computing
privacy
pubcrawl
public blockchain
resilience
Resiliency
Scalability
hardware-assisted transparent enclave
sensor-rich mobile devices
SGX-enabled server
smart contract
smart contracts
Task Analysis
third-party platform
transparent blockchain
trusted hardware
zero-knowledge proof
data confidentiality
blockchain
Compositionality
crowd wisdom
crowd wisdom aggregation
Crowdsensing
crowdsensing systems
Cryptography
data aggregation
Data collection
Aggregates
data deletion
data privacy
Data Sanitization
data sensing
decentralized blockchain technology
differential privacy
Distributed databases
ethereum
faulty data providers
biblio
Modeling a Virtual Reality System with Caching and Computing Capabilities at Mobile User’ Device
Submitted by grigby1 on Thu, 06/04/2020 - 10:47am
mobile computing
VR device
virtual reality system
virtual reality
user experience
Resiliency
resilience
pubcrawl
privacy
multiuser models
mobile user device
3-Dimensional experiences
immersive systems
Human Factors
cyber physical systems
computation capability
composability
caching models
caching
cache storage
augmented reality
3D experiences
biblio
A Forensics Activity Logger to Extract User Activity from Mobile Devices
Submitted by grigby1 on Wed, 06/03/2020 - 11:03am
mobile devices
user activity
tools
tool
smartphone
Scalability
Resiliency
resilience
register
pubcrawl
personal tracker
personal information
performance evaluation
Oxygen
Mobile handsets
activity
mobile computing
mobile
Metrics
information forensics
information filtering
Human Factors
Human behavior
forensics activity logger
Forensics
Digital Forensics
Data mining
daily activities
android
biblio
Cryptanalysis and improvement of a cloud based login and authentication protocol
Submitted by aekwall on Mon, 06/01/2020 - 10:04am
online banking system
impersonation attack
internet
medium scale banking organization
Metrics
Mobile banking
mobile computing
multifactor authentication
Online banking
Human Factors
pubcrawl
public cloud
resilience
Resiliency
security
Servers
small scale banking organization
authentication
Human behavior
high-speed online services
Fingerprint recognition
electronic banking
e-banking services
e-banking
Cryptographic Protocols
cryptanalysis
cloud server
Cloud Computing
cloud based login
Business
bank data processing
authorisation
authentication protocol
biblio
Hybrid Feature Extraction for Palmprint-Based User Authentication
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Metrics
user identity verification
texture
Smartphones
smart phones
security
Resiliency
resilience
pubcrawl
palmprint-based user authentication
palmprint recognition
multifactor authentication
mobile verification scenarios
Mobile handsets
mobile computing
authentication
IT systems
image texture
image colour analysis
hybrid feature extraction
Human Factors
Human behavior
Histograms
feature extraction
Discrete Fourier transforms
Databases
color information
biometry
authorisation
biblio
Multifactor Authentication on Mobile Secure Attendance System
Submitted by aekwall on Mon, 06/01/2020 - 10:02am
mobile
smartphone
smart phones
security of data
Secure Attendance
secure android ID
Resiliency
resilience
pubcrawl
Personnel
performance evaluation
multifactor authentication
Monitoring
mobile secure attendance system
Mobile handsets
mobile computing
android
Metrics
Human Factors
Human behavior
GPS
Global Positioning System
fraud
Fingerprint recognition
fingerprint
employee attendance system
employee activities
BYOD
bring your own device
authentication
attendance recording
attendance device
biblio
Behaviour Analysis and Detection of Blackhole Attacker Node under Reactive Routing Protocol in MANETs
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Scalability
Resiliency
pubcrawl
Routing
Routing protocols
collaboration
Throughput
MANETs
Ad hoc networks
mobile computing
AODV
Blackhole attack
Blackhole
Energy
PDR
Routing Protocol
biblio
Simulation Based Study of Blackhole Attack Under AODV Protocol
Submitted by aekwall on Tue, 05/26/2020 - 9:58am
Ad hoc networks
unauthorized node
target node
open access
Mobile adhoc Network
MANET nodes
Blackhole
AODV
AODV protocol
Blackhole attack
NS-2
mobile computing
Scalability
Throughput
mobile ad hoc networks
MANET
delays
Handheld computers
Routing
Routing protocols
pubcrawl
Resiliency
telecommunication security
biblio
Simulation of MANET's Single and Multiple Blackhole Attack with NS-3
Submitted by aekwall on Tue, 05/26/2020 - 9:57am
Mobile ad hoc networks (MANETs)
ad hoc nature
AODV protocol
battery power
central authority
dynamic topologies
IEEE 802.11ac protocol
industrial fields
memory space
Blackhole attack
mobile ad-hoc networks
mobility model
multiple Blackhole attack
NS-3 simulator
NS-3.27 simulator
OLSRprotocol
physical protection
single Blackhole attack
network nodes
telecommunication security
network security
Resiliency
pubcrawl
Routing protocols
Routing
mobile radio
delays
Scalability
Relays
wireless LAN
MANET
mobile ad hoc networks
telecommunication network topology
Ad hoc networks
mobile computing
fixed infrastructure
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
…
next ›
last »