Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
biometrics
biblio
PHBio: A Pallier Homomorphic Biometric Encryption Scheme in Healthcare 4.0 Ecosystems
Submitted by grigby1 on Fri, 03/31/2023 - 11:25am
biometric encryption
pubcrawl
authentication
biometrics
biometrics (access control)
Ecosystems
Euclidean distance
Healthcare 4.0
Medical services
Metrics
paillier cryptosystem
privacy
privacy preservation
real-time systems
resilience
Resiliency
biblio
Securing Biometric Data with Optimized Share Creation and Visual Cryptography Technique
Submitted by grigby1 on Fri, 03/31/2023 - 11:23am
biometric encryption
pubcrawl
Aerospace electronics
Biological system modeling
biometrics
biometrics (access control)
encryption
Homomorphic encryption
Metrics
Optimal key generation
resilience
Resiliency
security
Share creation
visual databases
visualization
biblio
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
key generation
encryption system
Dynamic Key
random key generation
Resiliency
Iris
biometrics
randomness
Image color analysis
Mathematics
encryption
resilience
NIST
authentication
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
Cloud Computing
biblio
EMG Data Collection for Multimodal Keystroke Analysis
Submitted by grigby1 on Fri, 03/03/2023 - 5:18pm
Data collection
pubcrawl
Human behavior
Metrics
Software
authentication
Protocols
Keyboards
biometrics (access control)
biometrics
keystroke analysis
data post-processing
electromyography
EMG
Myo armband
biblio
A Review on Behavioural Biometric Authentication
Submitted by grigby1 on Fri, 02/03/2023 - 5:10pm
keystroke
Support vector machines
Scalability
Resiliency
resilience
pubcrawl
Pattern recognition
pattern locks
Mice
keystroke dynamics
keystroke analysis
human characteristics
Human behavior
Hardware
gait
footstep pressure
biometrics
Behavioral sciences
Behavioral
authentication
biblio
Methods and Algorithms for Generating a Storage Key Based on Biometric Parameters
Submitted by grigby1 on Tue, 06/14/2022 - 3:15pm
neural network
Radon transform
bio key
biometrics
biometrics (access control)
Algorithm
Transforms
biometric encryption
automation
information security
Software algorithms
Metrics
Reed-Solomon codes
Access Control
Scalability
Resiliency
resilience
pubcrawl
biblio
Biometric Steganography Using MPV Technique
Submitted by grigby1 on Tue, 06/14/2022 - 3:14pm
Decoding
stego image
MPV
Inverse Arnold Transform
Arnold transform
biometrics (access control)
Transforms
Steganography
biometric encryption
biometrics
Interference
encryption
Receivers
Metrics
Data Security
Cryptography
privacy
Scalability
Resiliency
resilience
pubcrawl
biblio
ECG Signal Classification Using Convolutional Neural Networks for Biometric Identification
Submitted by grigby1 on Tue, 04/19/2022 - 10:44am
Metrics
Telecommunications
Spectrogram
signal processing security
Signal processing algorithms
Resiliency
resilience
pubcrawl
privacy
pattern classification
Biological system modeling
Electrocardiography
ECG signal processing
Databases
convolutional neural network
composability
classification
biometrics (access control)
biometrics
biblio
Spoofing Attacks to Radar Motion Sensors with Portable RF Devices
Submitted by grigby1 on Tue, 04/19/2022 - 10:39am
authentication
Binary phase shift keying
biometrics
Continuous Authentication
Doppler radar
performance evaluation
Phase shifters
pubcrawl
radar sensors
resilience
Scalability
security
Sensor phenomena and characterization
sensor security
spoofing attacks
surveillance
biblio
Method of Hierarchical Protection of Biometric Information
Submitted by grigby1 on Wed, 03/09/2022 - 1:40pm
Fingerprint recognition
concealment
bit.
biometrics
biometric data
biometrics (access control)
information
Steganography
Telecommunications
multifactor authentication
Metrics
tools
Data protection
information and communication technology
authentication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
information security
1
2
3
4
5
6
7
next ›
last »