Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

unauthorized wearable devices

biblio

Visible to the public Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy

Submitted by grigby1 on Wed, 01/16/2019 - 2:31pm
  • transport protocols
  • wearables security
  • unauthorized wearable devices
  • transport layer security handshake protocol
  • TLS handshake protocol
  • session key
  • sensitive data
  • secure data transmission
  • Prototypes
  • mobile authentication proxy
  • handshake protocol
  • Data collection
  • authentication protocol
  • application server
  • Wearable Device
  • proxy
  • authorisation
  • Servers
  • Cryptography
  • Cryptographic Protocols
  • performance evaluation
  • message authentication
  • telecommunication security
  • Protocols
  • Scalability
  • Resiliency
  • Human behavior
  • pubcrawl
  • authentication

Terms of Use  |  ©2023. CPS-VO