Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
biometrics
biblio
Continuous Biometric Verification for Non-Repudiation of Remote Services
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
security
pubcrawl
Resiliency
Human behavior
authentication
composability
protocol
resilience
Metrics
human factor
biometrics
biometric signature
Continuous Authentication
non-repudiation
Repudiation
biblio
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics
Submitted by grigby1 on Tue, 05/01/2018 - 11:21am
biometrics
Continuous Authentication
Metrics
biblio
Evaluating Behavioral Biometrics for Continuous Authentication: Challenges and Metrics
Submitted by grigby1 on Mon, 04/30/2018 - 3:08pm
biometrics
Continuous Authentication
Metrics
pubcrawl
Security Metrics
biblio
Insider Misuse Attribution Using Biometrics
Submitted by grigby1 on Mon, 03/05/2018 - 1:17pm
biometrics
data leak
Digital Forensics
guilty identification
Human behavior
Human Factors
information forensics
Metrics
pubcrawl
resilience
Resiliency
Scalability
Steganography
biblio
Secure authentication on the Internet of Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:49am
lightweight cryptographic algorithms
user credential protection
universal access
Servers
resource constrained environments
Resiliency
resilience
pubcrawl
Protocols
Phishing
mutual multifactor authentication
multifactor authentication
Metrics
memory requirements
man-in-the-middle attacks
authentication
Internet of Things
Human Factors
human factor
Human behavior
Cryptography
Cryptographic Protocols
confidential communications
Computer crime
code size
Ciphers
biometrics (access control)
biometrics
biometric-based cryptographic techniques
biometric authenticated key exchange protocol
biblio
Enhancing Breeder Document Long-Term Security Using Blockchain Technology
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
Ecosystems
travel industry
statu nascendi
security of data
security
Scalability
Resiliency
pubcrawl
Iris recognition
Image coding
Identity management
Human behavior
electronic travel documents
electronic commerce
bitcoin security
e-passports
document handling
Cryptography
content harmonisation
breeder document standardisation
breeder document long-term security enhancement
breeder document
blockchain
Bitcoin blockchain
bitcoin
birth certificates
birth certificate
biometrics
biblio
Mobile biometrics: Towards a comprehensive evaluation methodology
Submitted by grigby1 on Tue, 01/16/2018 - 6:34pm
Mobile communication
Training
testing
Smartphone Authentication
smart phones
Scalability
Resiliency
pubcrawl
Pervasive Computing Security
authentication
Mobile Biometrics
Metrics
Human-computer interaction
Human Factors
Guidelines
biometrics (access control)
biometrics
biblio
Biometric Image Encryption Using DNA Sequences and Chaotic Systems
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
distributed network systems
Resiliency
pubcrawl
performance computation
nonlinear deterministic system
network security
Metrics
Logistics
Image Processing
hyper chaotic system
encryption
dynamic system
DNA sequence
DNA cryptography
DNA computing
DNA
biocomputing
Cryptography
Correlation
composability
complex problems
communication technologies
chaotic theory
Chaotic systems
chaotic cryptography
chaotic communication
chaos
biometrics (access control)
biometrics
biometric image encryption
biometric digital image encryption
biblio
Do We Have to Trust the Deep Learning Methods for Palmprints Identification?
Submitted by grigby1 on Thu, 10/19/2017 - 11:26am
biometrics
data fusion
deep learning
Metrics
Multispectral palmprint
PCANet
pubcrawl
Resiliency
Scalability
security
Visible Light Communications Security
biblio
Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting
Submitted by K_Hooper on Wed, 10/04/2017 - 10:54am
Adversary Models
biometrics
gshade
Human behavior
malicious adversaries
pubcrawl
Resiliency
scalabilty
secure two-party computation
semi-honest adversaries
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »