Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure authentication
biblio
Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Submitted by grigby1 on Fri, 08/25/2023 - 3:42pm
Protocols
Two way authentication
secure authentication
legitimate node
insider attacks
ElGamal encryption
passwords
location awareness
Costs
Resiliency
Elliptic curve cryptography
Policy Based Governance
insider threat
web services
Cryptography
authentication
resilience
policy-based governance
Metrics
Human Factors
Human behavior
pubcrawl
Insider Threats
biblio
A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
Submitted by grigby1 on Fri, 05/06/2022 - 10:32am
resilience
secure authentication
key agreement
DNA cryptography
smart cards
mutual authentication
DNA
Mathematics
parallel processing
pubcrawl
Metrics
encoding
Protocols
privacy
authentication
Resiliency
Human behavior
biblio
A distributed biometric authentication scheme based on blockchain
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
homomorphically encrypted form
wearable computers
usability
smart contracts
sensitive users
sensitive biometric data
secure authentication
Scalability
Resiliency
pubcrawl
privacy
nonencrypted form
modern computing systems
Metrics
message authentication
biometric encryption
Homomorphic encryption
enhanced usability
encryption
Distributed databases
distributed biometric authentication
Cryptography
cautious handling
blockchain
biometrics (access control)
biometric templates
biometric
authorisation
authentication
biblio
Fuzzy Extractor-Based Key Agreement for Internet of Things
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
secure authentication
Fuzzy Cryptography
transmission data
Reed Solomon codes
recognition rate results
key agreement
IoT actors
fuzzy vault principle
fuzzy extractor-based key agreement
effective key agreement scheme
computation times
Biometric cryptosystem
Hamming codes
fuzzy extractor
Scalability
data exchange
Reed-Solomon codes
biometrics (access control)
sensors
public key cryptography
fuzzy set theory
authentication
Metrics
pubcrawl
Resiliency
feature extraction
Internet of Things
Cryptography
biblio
A Secure Authentication and Key Establishment Scheme for Wearable Devices
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
resilience
wireless sensor networks
Wireless communication
Wireless body area networks
smart-home
smart-healthcare
Servers
sensors
security shortcomings
secure services
secure mutual authentication
secure authentication
Scalability
Resiliency
anonymous messages
pubcrawl
message authentication
Medical services
lightweight mutual authentication
lightweight anonymous user authentication
legitimate users
key establishment scheme
computer network security
body area networks
authorisation
authentication
anonymous messaging
biblio
Cyber-physical systems security through multi-factor authentication and data analytics
Submitted by aekwall on Mon, 06/01/2020 - 11:04am
Internet of Things
Smart homes
smart cities
secure authentication
Resiliency
resilience
pubcrawl
password
multifactor authentication
Multi-factor authentication
Metrics
authentication
Internet of Everything
Human Factors
Human behavior
event processing
Data Analytics
data analysis
cyber-physical systems security
cyber-physical systems
complex system
authorisation
biblio
NAuth: Secure Face-to-Face Device Authentication via Nonlinearity
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
mobile computing
Secure File Sharing
resilience
Resiliency
pubcrawl
user intervention
telecommunication security
size 20.0 cm
short distance file transfer
secure face-to-face device authentication
secure authentication
pairing schemes
Nonlinear distortion
Nhuth
mobile devices
authentication
microphones
message authentication
location-sensitive authentication mechanism
location-based-validation model
Harmonic analysis
face-to-face scenarios
face-to-face device-to-device communication
face-to-face D2D
Device-to-device communication
device legitimacy
device authentication consistency
critical security problem
Acoustics
acoustic nonlinearity patterns
biblio
Host Oriented Factor Normalizing Authentication Resource: More Secure Authentication for Legacy Systems
Submitted by aekwall on Mon, 03/02/2020 - 12:26pm
password
software program
scalable multifactor authentication method
legacy systems authentication
legacy systems
host oriented factor normalizing authentication resource
computer systems security
authentication model
two factor authentication
secure authentication
Multi-factor authentication
authorisation
radiofrequency identification
biometrics
authorization
security issues
Human Factors
biometrics (access control)
software maintenance
radio frequency identification
pubcrawl
biblio
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
alphanumeric password system
twofish encryption and visual cryptography method
Twofish encryption
two factor authentication
TEVC method
TEVC encryption algorithm
password protections
message code confirmation
Java platform
Graphical Password authentication
Graphical Password
fingerprint scan
dual authentication process
authentication method
authorisation
secure authentication
data communication
Human Factors
data visualisation
computational complexity
encryption
visual cryptography
Java
message authentication
Data protection
internet
pubcrawl
Cryptography
biblio
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey
Submitted by aekwall on Mon, 03/02/2020 - 12:25pm
face recognition
two factor authentication
web authentication methods
user authentication
single-factor authentication
secure authentication
Digital Multifactor authentication
Cyber Physical System
two-factor authentication
multifactor authentication
Multi-factor authentication
Servers
Human Factors
Fingerprint recognition
sensors
password
message authentication
authentication
Cryptography
pubcrawl
cyber-physical systems
authorisation
1
2
next ›
last »