Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Identity management
biblio
uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 1:22pm
SSI
pubcrawl
public domain software
resilience
Resiliency
Scalability
Self-Sovereign Identity
Servers
smart contracts
Open Source Software
SSI IDM system
standards
uPort
uPort identity management system
uPort open-source identity management system
user-centric data platform
Verifiable Credential
blockchain
Mobile Applications
IdM
identity management systems
identity management system
Identity management
Human behavior
ethereum
Distributed databases
digital services
DID
Decentralized IDentifier
decentralized application
Decentralized App
DApp
Cryptography
biblio
3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
decentralize identity management system
TTP
trusted third party
three blockchains identity management
telecommunication security
self-generated identity
self-generated certificates
Scalability
Resiliency
public key cryptography
pubcrawl
Metrics
internet
elliptic curves cryptography
Elliptic curve cryptography
Identity management
Cybersecurity
Cryptographic Protocols
computer network security
computer network management
certificate authority
Blockchains Identity Management
blockchain technology
blockchain
autonomous network
authorisation
authentication server
Authentication Protocols
3BI-ECC
biblio
A Comparative Survey on Blockchain Based Self Sovereign Identity System
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
Medical services
smart contracts
self sovereign identity
Scalability
Resiliency
resilience
Public key
pubcrawl
privacy
Identity management
internet
Human Factors
Human behavior
honey pots
Honey Pot
Cryptography
blockchain
biblio
Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter Metrics
Submitted by grigby1 on Mon, 10/05/2020 - 1:11pm
underwater acoustic communication
secure access
security
telecommunication security
terrestrial MANETs
threat identification
Trust Management Framework
trust model
uncertainty
Scalability
underwater acoustic MANETs
Underwater Acoustic Mobile Ad-hoc Network
underwater acoustic Mobile Ad-hoc NETworks
Underwater acoustics
underwater environment
Unified modeling language
Vulnerability Analysis
Identity management
Access Control
Ad hoc networks
cloud model
communication metrics
computer theory
cyber security
harsh underwater environments
Human Factors
802.11-based MANET
Measurement
mobile ad hoc networks
mobile computing
multiparameter metrics
pubcrawl
resilience
Resiliency
biblio
Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance
Submitted by aekwall on Mon, 07/13/2020 - 10:19am
online services
aggregation model
attribute aggregation method
attribute assurance
Credit cards
decentralized peer to peer scheme
Digital identity
identity assurance
identity management attribute aggregation
Aggregates
probabilistic attribute aggregation
self-sovereign identity solutions
Service Provisioning
statistical distributions
trust demand
trust requirement
trusted third party
trust
Trusted Computing
Resiliency
pubcrawl
composability
Peer-to-peer computing
internet
authentication
service providers
security of data
Probabilistic logic
Logic gates
trust model
Identity management
Identity provider
probability distributions
web of trust
biblio
SIRLC: Secure Information Retrieval using Lightweight Cryptography in HIoT
Submitted by grigby1 on Wed, 03/18/2020 - 11:28am
pubcrawl
Internet of Things
LiBAC
Light-Weight Cryptography
lightweight break-glass access control
medical information systems
medical records
patient care
patients care
private key cryptography
information retrieval
reduced computational complexity
resilience
Resiliency
secret key generation time
Secure File Sharing
secure information retrieval using lightweight cryptography
SIRLC
therapeutic records
encryption
access permission
attribute based key
Attribute based Key Management
authorisation
authoritative entities
cipher text size
Emergency care
emergency key
emergency supporting representatives
Access Control
enhanced security
ESR
Generators
health care
healthcare Internet of things
HIoT
hospitals
Identity management
biblio
Towards Achieving a Secure Authentication Mechanism for IoT Devices in 5G Networks
Submitted by aekwall on Mon, 03/16/2020 - 9:34am
Internet of Things
telecommunication security
security mechanisms
secure authentication mechanism
Scalable Security
Scalability
pubcrawl
NB-IOT
Narrowband IoT
mobile network infrastructure
Mobile Identity Management
message authentication
IoT security
IoT platform
IoT device
composability
Identity provider
Identity management
edge computing
Cross-Layer Security
Conferences
Computer crime
Cloud Computing
cellular radio
cellular network architecture
cellular IoT
5G networks
5G mobile communication
Cross Layer Security
Resiliency
biblio
Decentralized Multi-Sensor Scheduling for Multi-Target Tracking and Identity Management
Submitted by grigby1 on Tue, 01/21/2020 - 10:38am
pubcrawl
wireless sensor networks
telecommunication scheduling
target tracking
target information
state estimation
sensor fusion
sensor dynamic constraints
Scalability
resilience
closed-loop multitarget tracking algorithm
primary sensor
multiple secondary sensors
identity management method
identity management algorithm
Identity management
Human behavior
Decision Making
decentralized multisensor scheduling
biblio
Efficient Privacy-Preserving User Identity with Purpose-Based Encryption
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
identity management systems
Scalability
resilience
purpose-based encryption
pubcrawl
Protocols
privacy-preserving user identity
Privacy-preserving
Privacy Policies
privacy
PII
personal identifiable information
identity propagation
attribute-based encryption
Identity management
Human behavior
General Data Protection Regulation
federated identity management
Facebook
encryption
Data protection
Cryptography
cloud services
cloud environment
Cloud Computing
authorization
biblio
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
Human behavior
shamir secret sharing
Self-Sovereign Identity
secure management
Scalability
resilience
pubcrawl
Protocols
proof-of-concept digital wallet
practical key recovery model
password
Online banking
key recovery
identity management services
Identity management
Hyperledger Indy distributed ledger technology
authorisation
financial data processing
distributed ledger
digital wallet
digital identity management
decentralized key recovery solution
data privacy
Data models
Cryptography
cryptographic keys
cryptocurrency
cryptocurrencies
credentials
Computational modeling
blockchain
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »