Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
India
biblio
Cybersecurity Behaviour of Smartphone Users Through the Lens of Fogg Behaviour Model
Submitted by grigby1 on Tue, 03/30/2021 - 11:03am
India
User behaviour
smartphone users
Smartphone user
smart phones
security
secure behaviour
pubcrawl
protection motivation theory
planned behaviour
mobile computing
behaviour change
Human Factors
Human behavior
Human aspect
fogg behaviour model
cybersecurity behaviour
cybersecurity awareness program
Cybersecurity
Computer crime
behavioural science
biblio
Identity management using permissioned blockchain
Submitted by grigby1 on Mon, 03/29/2021 - 1:23pm
public key cryptography
identity cards
Identity management
identity management capabilities
identity thefts
India
permissioned blockchain
person identity authentication
personal data hashing
privacy
privacy concepts
private key cryptography
pubcrawl
Human behavior
public-private keys
resilience
Resiliency
Scalability
score-card
security
Self-Sovereign Identity
smart cards
smart contracts
unauthorized hands
US Home Land Security
efficient identity management
authorisation
Bitnation
blockchain technology
contracts
cryptocurrencies
data privacy
design information security
Digital India
distributed ledger
Distributed trust model
distribution control
e-Residency
Aadhar-card
Estonia
ethereum
Fabrics
financial data processing
fraud
fraud cases
Government
government agencies
government data processing
hashing algorithms
homeland security enterprise
biblio
Enhancing the Performance Analysis of LWA Protocol Key Agreement in Vehicular Ad hoc Network
Submitted by aekwall on Mon, 08/03/2020 - 9:18am
telecommunication security
Resiliency
restricted lightweight authentication protocol
road accidents
road safety
road side units
Roads
RSU
Security Arrangements
Protocols
user authentication
V2CH
V2V
VANET
vehicle-to-vehicle communication
vehicular ad hoc network
vehicular ad hoc networks
pubcrawl
private key cryptography
password
NS2 simulation
NS-2 simulation
mystery keys
Metrics
LWA protocol key agreement
key agreement
India
Cryptographic Protocols
Compositionality
car safety
automobiles
authentication
Ad Hoc Network Security
biblio
Building an Open Identity Platform for India
Submitted by grigby1 on Wed, 03/08/2017 - 1:31pm
internet
vendor neutrality
unique identity project
technology platform
technology architecture
supply chains
security of data
security
pubcrawl170112
open systems
open standards
open source components
open identity platform
Aadhaar authentication service
India
design thinking
data centers
computer centres
computer architecture
Buildings
biometrics (access control)
biometric identity system
authentication
architecture
Aadhaar system
biblio
Phishing in International Waters: Exploring Cross-national Differences in Phishing Conceptualizations Between Chinese, Indian and American Samples
Submitted by emerson on Wed, 09/17/2014 - 5:30pm
Science of Security
Foundations
ACM CCS
China
cultural differences
foundations
Human and Societal Aspects of Security and Privacy
India
information privacy
Intrusion/Anomaly Detection and Malware Mitigation
nationality
online privacy
Phishing
Privacy Protections
Science of Security
Social Aspects of Security and Privacy
Social Engineering Attacks
susceptibility
ACM CCS
Information Privacy
Phishing
Privacy Protections
Social Aspects of Security and Privacy
Social Engineering Attacks
Human and Societal Aspects of Security and Privacy
Intrusion/Anomaly Detection and Malware Mitigation
file
Phishing In International Waters
Submitted by emerson on Tue, 06/03/2014 - 4:35pm. Contributors:
Emerson Murphy-Hill
Chris Mayhorn
Rucha Tembe
Olga Zielinska
Yuqi Liu
Kyung Wha Hong
Xi Ge
China
cultural differences
India
nationality
online privacy
susceptibility
HotSoS 2014
Academia
Presentations
Presentation Slides
Phishing