Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wearable computers
biblio
A Three-Party Mutual Authentication Protocol for Wearable IOT Health Monitoring System
Submitted by grigby1 on Mon, 01/31/2022 - 2:46pm
authentication
WIHMS
Three-Party
Internet of Things(IoT)
wearables security
wearable computers
wearable sensor
mutual authentication
Databases
Protocols
Internet of Things
Scalability
performance evaluation
Resiliency
resilience
Human behavior
pubcrawl
security
privacy
biblio
A Cloud-based Mobile Healthcare Monitoring Framework with Location Privacy Preservation
Submitted by grigby1 on Thu, 07/08/2021 - 1:37pm
obfuscation
wearable computers
user privacy in the cloud
user privacy
Technological innovation
Sensitivity
Scalability
Resiliency
resilience
pubcrawl
personal health monitoring system
ART
Monitoring
Metrics
location privacy
Informatics
data privacy
Crowdsensing
context-awareness
Cloud Computing
cloud
biblio
Peripheral View of IoT based Miniature Devices Security Paradigm
Submitted by aekwall on Wed, 07/07/2021 - 3:47pm
Regulations
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
Wireless communication
wearable computers
standardization
security
Miniature devices security
Big Data
encryption
ubiquitous computing
privacy
Human Factors
Hardware
biblio
A Yoking-Proof and PUF-based Mutual Authentication Scheme for Cloud-aided Wearable Devices
Submitted by grigby1 on Thu, 05/20/2021 - 11:16am
pubcrawl
Yoking Proof
wearables security
Wearable Device
wearable computers
Servers
Scalability
Resiliency
resilience
PUF-based
authentication
Protocols
privacy
Physical Unclonable Function
Metrics
IoT
Human behavior
Hash functions
Cloud Computing
biblio
A Yoking-Proof Based Remote Authentication Scheme for Cloud-Aided Wearable Devices (YPACW)
Submitted by grigby1 on Thu, 05/20/2021 - 11:15am
Protocols
Yoking Proof
wearables security
Wearable devices
wearable computers
Servers
Scalability
Resiliency
resilience
pubcrawl
authentication
privacy
Metrics
IoT
Human behavior
Hafnium
Cloud Computing
Biomedical monitoring
authentication scheme
biblio
Raspberry Pi Based Smart Wearable Device for Women Safety using GPS and GSM Technology
Submitted by grigby1 on Thu, 05/20/2021 - 11:14am
Scalability
wearables security
wearable computers
Raspberry Pi3
E-mail alert
GSM
Satellites
Universal Serial Bus
GPS
Global Positioning System
privacy
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
biblio
A distributed biometric authentication scheme based on blockchain
Submitted by aekwall on Tue, 03/09/2021 - 10:56am
homomorphically encrypted form
wearable computers
usability
smart contracts
sensitive users
sensitive biometric data
secure authentication
Scalability
Resiliency
pubcrawl
privacy
nonencrypted form
modern computing systems
Metrics
message authentication
biometric encryption
Homomorphic encryption
enhanced usability
encryption
Distributed databases
distributed biometric authentication
Cryptography
cautious handling
blockchain
biometrics (access control)
biometric templates
biometric
authorisation
authentication
biblio
A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain
Submitted by aekwall on Mon, 09/28/2020 - 10:56am
ring signature
Computing Theory and Privacy
wearable smart sensing devices
user identifier
stealth address
smart sensing area
smart sensing
privacy-user-friendly scheme
personal data privacy
Intelligent sensors
blockchain based scheme
wearable computers
user experience
Scalability
privacy protection
sensors
human computer interaction
Public key
service providers
blockchain
privacy
pubcrawl
Human behavior
Resiliency
Protocols
data privacy
biblio
Light-weight white-box encryption scheme with random padding for wearable consumer electronic devices
Submitted by aekwall on Mon, 07/20/2020 - 9:45am
white-box attacks
white box cryptography
white-box attack contexts
wearabledevices
wearable consumer electronic devices
wearable computing
random secret components
random padding
physical nature
low computational power
limited memory
lightweight white box encryption scheme
decryption algorithms
Consumer electronics
Cryptography
cryptosystem
wearable computers
Wearable devices
Context
privacy protection
pubcrawl
Data mining
Metrics
composability
Resiliency
performance evaluation
encryption
biblio
A Usable Authentication System Using Wrist-Worn Photoplethysmography Sensors on Smartwatches
Submitted by aekwall on Mon, 02/17/2020 - 1:57pm
haemodynamics
wearables security
wrist-worn photoplethysmography sensors
true rejection rate
tendon movements
smartwatches
raw PPG signals
private consumer market
PPG sensors
photoplethysmography
muscle movements
mobile sensing
medical signal processing
hand gesture
Scalability
blood vessels
blood flow
authentication system
arterial geometry
wearable computers
patient monitoring
gesture recognition
authentication
privacy
pubcrawl
Human behavior
Resiliency
Data Security
« first
‹ previous
1
2
3
4
next ›
last »