Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mobile computing
biblio
The Creation Process of a Secure and Private Mobile Web Browser with no Ads and no Popups
Submitted by grigby1 on Fri, 04/17/2020 - 10:44am
Metrics
Web Browser Security
World Wide Web
Web sites
secure mode
private mode
mobile Web browser
Mobile Applications
hypermedia markup languages
HTML5 Web page
creation process
Browsers
Compositionality
security of data
online front-ends
mobile computing
composability
web services
internet
data privacy
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Side Channel Attacks in Computation Offloading Systems with GPU Virtualization
Submitted by grigby1 on Fri, 04/17/2020 - 10:23am
Runtime
Metrics
mobile computing
mobile systems
operating system
privacy
pubcrawl
resilience
Resiliency
Libraries
side channel attack
side channel attacks
side-channel attacks
virtual machine
virtual machines
virtualisation
Virtualization
virtualization privacy
graphics processing units
Cloud Computing
composability
computation offloading systems
computation performance
Cryptography
GPU systems
GPU vendors
GPU virtualization
cloud
high-performance GPUs
Human behavior
Human Factors
intensive computation
Internet of Things
IoT
Kernel
learning (artificial intelligence)
biblio
Trustworthy IoT: An Evidence Collection Approach Based on Smart Contracts
Submitted by aekwall on Mon, 04/13/2020 - 10:22am
contracts
Trustworthy Systems
trustworthy IoT assurance evaluation
trustworthy evidence collection
smart IoT systems clash
service-based methodology
mobile end users
hyperledger fabric blockchain
cloud-based applications
Assurance Evaluation
secure environment
cyber physical systems
interconnected devices
IoT
smart contracts
Distributed databases
cryptocurrencies
blockchain
composability
pubcrawl
Resiliency
mobile computing
Trusted Computing
Internet of Things
Cloud Computing
biblio
ALTEE: Constructing Trustworthy Execution Environment for Mobile App Dynamically
Submitted by aekwall on Mon, 04/13/2020 - 10:21am
host app
Trustworthy Systems
trustworthy execution environment
trusted OS
trusted applications
TEE driver
TEE constructing method
secure world
secure functions
secure code size
popular security features
mobile platforms
mobile app dynamically
mobile
security of data
current TEE solutions
ALTEE
.so library
cyber physical systems
TEE
operating systems (computers)
composability
pubcrawl
Resiliency
mobile computing
Trusted Computing
TrustZone
biblio
Towards Privacy in Geographic Message Dissemination for Connected Vehicles
Submitted by aekwall on Mon, 04/13/2020 - 10:06am
legal regulations
Security by Default
vehicle routing
traffic information systems
traffic information
space-filling curves
server infrastructure
Routing
road traffic
privacy-by-design principle
privacy-by-design
privacy-by-default principle
location updates
location based services
road safety
geographic relevance area
geographic message dissemination
consistent hashing
connected vehicles
Traffic Management
user privacy
client-server systems
pubcrawl
Resiliency
mobile computing
data privacy
Scalability
biblio
SERS: A Security-Related and Evidence-Based Ranking Scheme for Mobile Apps
Submitted by aekwall on Mon, 04/13/2020 - 10:05am
Security by Default
User Ratings
trust
subjective logic
static taint analysis
smart phones
smart mobile devices
SERS
sentiment analysis
security-related internal aspect
security-related comments
security-related and evidence-based ranking scheme
security of data
app distribution platforms
security
Scalability
Resiliency
ranking
pubcrawl
mobile computing
Mobile Apps
Measurement
Google PlayStore
Google
Databases
Data mining
biblio
Research on Privacy Protection with Weak Security Network Coding for Mobile Computing
Submitted by grigby1 on Mon, 04/06/2020 - 2:23pm
network coding
Wireless fidelity
weak security network coding
telecommunication security
telecommunication network reliability
Servers
sensors
routing policy
Resiliency
resilience
pubcrawl
privacy protection
composability
mobile sensor networks
mobile computing
Metrics
information transmission process
information transfer mechanism
Homomorphic encryption
encryption
encoding
cyber physical systems
Cryptography
crowd sensing
biblio
Conundrum-Pass: A New Graphical Password Approach
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
graphical password system
pattern locks
unlocking time
trivial password methodologies
textual passwords
smudge attacks
shoulder surfing
security element
pattern lock
Password Submission
Password Registration
multiple chunks
mobile computing environment
graphical passwords
Scalability
graphical password schemes
Graphical Password
external attacks
conundrum-pass
password guessing
Computer graphics
dictionary attacks
authentication
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
The Enhanced Graphic Pattern Authentication Scheme Via Handwriting identification
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
user authentication
pattern locks
user information privacy
two factor identification scheme
touch screen
security authentication mechanism
random digital graphics
privacy information leakage
mobile device screen
keypad lock screen Apps
handwriting identification
handwriting graphic input track recognition technologies
Handwrite
graphic pattern information
graphic pattern authentication mechanism
electronic signature
Scalability
Computer graphics
privacy protection
security policy
handwriting recognition
digital signatures
authentication
smart phones
Data protection
internet
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
biblio
—Multiple Cluster-Android lock Patterns (MALPs) for Smart Phone Authentication‖
Submitted by aekwall on Mon, 04/06/2020 - 10:05am
cluster based progressive smart lock
pattern locks
Smart phone lock
smart phone authentication
smart lock facilities
smart android mobile phone
single authentication system
progressive authentication service
Pattern
multiple cluster-android lock patterns
multiple cluster based pattern match system
mobile phone user
dependent combination
Scalability
cluster
ALP
Android (operating system)
authentication
pattern matching
smart phones
pubcrawl
Human behavior
Resiliency
mobile computing
authorisation
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »