Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Identity management
biblio
Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks
Submitted by grigby1 on Mon, 01/21/2019 - 11:32am
sybil attacks
Peer-to-peer computing
protocol scheme
pubcrawl
Resiliency
road side units
Roads
RSU
Sybil attack prevention
mobile computing
symmetric key encryption
symmetric keys
telecommunication security
VANET
VANETs
vehicular ad hoc networks
vehicular networks
Identity management
ad-hoc networks
AES
authentication
CA
certification authority
Compositionality
Cryptographic Protocols
encryption
Ad Hoc Network Security
identity symmetric scheme
inter-communication
ITS
lightweight approach
malicious vehicle
Metrics
mobile ad hoc networks
biblio
Towards the Adoption of Secure Cloud Identity Services
Submitted by grigby1 on Mon, 12/03/2018 - 11:18am
pubcrawl
Access Control
data sharing
Identity management
Metrics
Proxy re-encryption
resilience
Resiliency
Scalability
user adoption
User behavior
user privacy in the cloud
biblio
Secure Storage of User Credentials and Attributes in Federation of Clouds
Submitted by grigby1 on Mon, 12/03/2018 - 11:18am
pubcrawl
Cloud Computing
cloud federation
Identity management
Metrics
resilience
Resiliency
Scalability
User behavior
user privacy in the cloud
biblio
Identity-Based Remote Data Integrity Checking of Cloud Storage From Lattices
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
lost attack
verification stage
tamper attack
storage management
Servers
Scalability
Resiliency
remote data integrity checking protocols
quantum computer attacks
public key cryptography
pubcrawl
provably secure
Protocols
matrix-vector multiplication
matrix multiplication
matrix-matrix multiplication
Cloud Computing
Lattices
lattice-based constructed cryptography
Identity management
identity-based remote data integrity checking protocol
ID-Based cryptography
Human behavior
data privacy
Data models
data integrity checking
data integrity
Cryptography
Cryptographic Protocols
communication cost
cloud storage
cloud service provider attack
biblio
Chaining trusted links by deploying secured physical identities
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
pubcrawl
unclonable physical tokens
Trust management
trusted links
trusted link
Trust Chaining by Physical Tokens
smart devices
security of data
security chain
secured physical identities
Secret Unkown Cipher
secret unknown ciphers
Scalability
Resiliency
authentication
Protocols
physical clone-resistant identities
Object recognition
Internet of Things
intermediate node
Identity management
Human behavior
generic node authentication protocols
Cryptography
Cryptographic Protocols
clone-resistant physical identity
Ciphers
biblio
Enhancing Breeder Document Long-Term Security Using Blockchain Technology
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Ecosystems
travel industry
statu nascendi
security of data
security
Scalability
Resiliency
pubcrawl
Iris recognition
Image coding
Identity management
Human behavior
electronic travel documents
electronic commerce
bitcoin security
e-passports
document handling
Cryptography
content harmonisation
breeder document standardisation
breeder document long-term security enhancement
breeder document
blockchain
Bitcoin blockchain
bitcoin
birth certificates
birth certificate
biometrics
biblio
An IDMS approach towards privacy and new requirements in IoT
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
mobile clients
user-centric
service provider
Scalability
Resiliency
pubcrawl
private information
privacy
personal authentication device
PAD
OAuth
Mobility
mobile radio
AVISPA
IoT identity management system
Internet of Things
IDMS
Identity provider IoT
Identity management
Human behavior
EAP
DTLS
domain
data privacy
Cryptographic Protocols
Cardinality
biblio
Securing user identity and transactions symbiotically: IoT meets blockchain
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
permissioned blockchain
user identity
transactions symbiotically
standards
security of data
security
Scalability
Robustness
Resiliency
Public key
pubcrawl
Protocols
privacy
Permissioned Blockchains
attribute management
performance evaluation
IoT
Internet of Things
Identity management
Human behavior
History
embedded devices
Distributed Identity Management
device identity
data privacy
Cryptography
blockchain technology
blockchain
biblio
Killing the password, part 1: An exploratory analysis of walking signatures
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
authentication
Global Positioning System
Human behavior
Identity management
identity management systems
Legged locomotion
Meteorology
Mobile Applications
network security
pubcrawl
Resiliency
Scalability
sensors
Statistical Learning
biblio
Analysis of Identity and Access Management alternatives for a multinational information-sharing environment
Submitted by K_Hooper on Wed, 02/14/2018 - 11:05am
Linear programming
US Department of Defense
technological solutions
technical factor
systems engineering
Scalability
Resiliency
Reliability
pubcrawl
political factors
operational factor
National security
multinational information sharing environment
military computing
military communication
access management alternative
Joint Information Environment
Identity management
identity and access management technologies
Identity and Access Management
identity analysis alternative
Human behavior
Governance protocols
Economics
economic factor
Cybersecurity
computer security
authorization
authorisation
Australia
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »