Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hybrid encryption
biblio
Enterprise WiFi Hotspot Authentication with Hybrid Encryption on NFC- Enabled Smartphones
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
smartphone
NFC- enabled smartphones
personally owned devices
pubcrawl
resilience
Resiliency
resources access
Servers
smart phones
network security
user authentication
Wi-Fi network
Wireless fidelity
wireless LAN
wireless local area network
WPA2 Enterprise
WPA2-802.1X model
authentication
Near Field Communication
multifactor authentication
Multi-factor authentication
Metrics
hybrid encryption
hybrid cryptosystem
Human Factors
Human behavior
Enterprise WiFi hotspot authentication
enterprise Wi-Fi hotspot authentication
encryption
Cryptography
connectivity
company information
business data transmission
biblio
Impact of SQL Injection in Database Security
Submitted by aekwall on Mon, 04/20/2020 - 9:44am
public key cryptography
world web applications
hybrid encryption
Elliptical Curve Cryptography
database information
dangerous hacking technique
cracking technique
Database Security
AES
relational database security
ECC
relational databases
Elliptic curve cryptography
authorisation
SQL injection attack
SQL
Databases
SQL injection
standards
Metrics
composability
pubcrawl
Human behavior
Resiliency
advanced encryption standard
encryption
biblio
Detection and Prevention of Attacks in MANETs by Improving the EAACK Protocol
Submitted by aekwall on Mon, 06/10/2019 - 9:16am
network security
MANET
MANET Attack Mitigation
MANETs
Metrics
mobile ad hoc networks
mobile computing
network infrastructure reliability
network overhead packet delivery ratio
malicious nodes
packet drops
Protocols
pubcrawl
Receivers
Resiliency
Routing
security
Selfish nodes
Cryptographic Protocols
Ad hoc networks
attack detection/prevention
attacks
authentication
authentication techniques
block encryption
composability
connectivity
Acknowledgment Packet
Cryptography
dynamic wireless links
EAACK
EAACK protocol
hybrid cryptography techniques DES
hybrid encryption
malicious behavior detection rates
biblio
Hybrid Attribute Based Encryption and Customizable Authorization in Cloud Computing
Submitted by aekwall on Wed, 02/13/2019 - 10:57am
storage server
Data Security
Dual Encryption
encrypted data
encryption
encryption control access
hybrid attribute based encryption
hybrid encryption
multi-linear map
data owners
user authorization
user data
verifiable customizable authorization
attribute based encryption
Human behavior
pubcrawl
collaboration
policy-based governance
Cipher-text-policy attribute-based encryption (CP-ABE)
Scalability
Servers
attribute-based security
authorisation
authorization
authorized cloud server
centralized systems
cipher-text policy attribute-based encryption
Cloud Computing
circuits
cloud servers
cloud user
complex access control
counterfeit cipher-text
Cryptography
data access
data confidentiality
« first
‹ previous
1
2