Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wearable computers
biblio
WristSpy: Snooping Passcodes in Mobile Payment Using Wrist-worn Wearables
Submitted by aekwall on Mon, 02/17/2020 - 1:57pm
financial data processing
wearables security
WristSpy
Wearable sensors
single wrist-worn wearable device
personal mobile devices
passcode input scenarios
passcode inference system
parallel PIN inference
parallel pattern inference
multidimensional feature extraction
mobile payment
machine-learning based classification
fine-grained hand movement trajectories
Euclidean distance
wearable computers
Scalability
Pins
Trajectory
Online banking
electronic money
parallel processing
privacy
Mobile handsets
pubcrawl
Human behavior
Resiliency
learning (artificial intelligence)
feature extraction
mobile computing
authorisation
biblio
Forensic Analysis of Wearable Devices: Fitbit, Garmin and HETP Watches
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
data comparison analysis
wearables security
wearable technology
Manuals
low-cost HETP fitness tracker
location data
HETP watches
Garmin Forerunner 110
garmin
fitness bands
Fitbit Charge HR
fitbit
digital forensic practitioners
Scalability
wearable computers
Wearable devices
Biomedical monitoring
forensic analysis
smart phones
Digital Forensics
Data mining
privacy
pubcrawl
Human behavior
Resiliency
Internet of Things
biblio
Password Guessing Using Machine Learning on Wearables
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
pubcrawl
wearables security
wearables
Wearable Device
wearable computers
ubiquitous items
sensitive data
security purposes
security of data
security
Scalability
Resiliency
raw data
accelerometer
privacy
password guessing
machine learning algorithms
machine learning
learning (artificial intelligence)
IoT
Human behavior
health context
GPS
Bluetooth
Accelerometers
biblio
WristUnlock: Secure and Usable Smartphone Unlocking with Wrist Wearables
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
random number
wearables security
WristUnlock
WristRaise mode
wrist wearable
wearable computers
usable smartphone
usability features
touch-based physical channel
touch sensitive screens
Smartphone Authentication
secure smartphone
security
Bluetooth connection
Bluetooth
usability
smart phones
privacy
pubcrawl
Human behavior
Resiliency
Scalability
security of data
biblio
Enhanced Lightweight Cloud-assisted Mutual Authentication Scheme for Wearable Devices
Submitted by aekwall on Mon, 02/17/2020 - 1:56pm
tools
wearables security
Wearable devices
wearable computers
symmetric cryptography
secure authentication process
lightweight cloud-assisted mutual authentication scheme
IoT authentication
cloud-assisted authentication scheme
Authentication Protocols
Wireless fidelity
IoT security
public key cryptography
message authentication
authentication
security
privacy
pubcrawl
Human behavior
Resiliency
mobile computing
Protocols
Cryptographic Protocols
telecommunication security
data privacy
Servers
Scalability
Cloud Computing
IoT
biblio
Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity
Submitted by grigby1 on Wed, 01/16/2019 - 1:31pm
smart phones
pubcrawl
radio communication range
Resiliency
Scalability
security of data
sensitive command pushing
sensitive information learning
sensitive information pulling
shared office spaces
physical barriers
smartphone
stolen wearable threat
taking pictures
telecommunication security
text messages
unattended wearable devices
wearable computers
wearables security
wireless communication medium
Glass
attack activity
audio proximity
audio signal processing
authentication
Biomedical monitoring
Bluetooth
Electronic mail
electronic messaging
emails
active audio challenge
Google
Human behavior
human computer interaction
insider attacker
insider threat
mobile computing
phone calls
photos
biblio
Constant Time, Fixed Memory, Zero False Negative Error Logging for Low Power Wearable Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
traditional error logging algorithms
pubcrawl
Reliability
resilience
Resiliency
run-time error logging
Scalability
security
Sensor Systems
privacy
wearable computers
Wearable devices
Wearable sensors
wearables security
Wireless communication
wireless sensor networks
wireless wearable embedded devices
zero false negative error
false positive error rate
Caching Algorithm
Conferences
constant insertion time
constant memory
constant time
embedded devices
Error Logging
error logging algorithm
Body Sensors
firmware
firmware faults
fixed memory
hashing
Human behavior
Internet of Things
IoT systems
low power wearable devices
biblio
Are Wearables Ready for HTTPS? On the Potential of Direct Secure Communication on Wearables
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
privacy
wireless LAN
Web servers
wearables security
wearables
wearable computers
smart phones
security
secure Internet communication
secure communication protocols
Scalability
Resiliency
resilience
pubcrawl
Protocols
available wearable computing devices
network measurements
Internet servers
internet
Human behavior
energy consumption
direct secure communication
direct Internet connection
direct Internet communication
direct communication
Cryptography
computer network security
Ciphers
Bluetooth
biblio
Wearable Device User Authentication Using Physiological and Behavioral Metrics
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
sensors
physiological data
Physiological Fingerprint
physiological metrics
privacy
pubcrawl
Reliable Data Collection
resilience
Resiliency
Scalability
patient monitoring
smart wearables
standards
wearable computers
wearable device user authentication
Wearable Security
Wearable-User Authentication
wearable-user authentication mechanism
wearables security
wellness-related metrics
health care
Apple Watch
authentication
authorisation
behavioral metrics
Biomedical monitoring
biometrics (access control)
coarse-grain minute-level physical activity
feature extraction
Fitbit users
Activity-based Fingerprint
Healthcare
healthcare providers
Heart rate
Human behavior
message authentication
Microsoft Band
microsoft windows
mobile computing
one-time authentication approaches
biblio
Analysis of ICMetrics Features/Technology for Wearable Devices IOT Sensors
Submitted by grigby1 on Mon, 04/02/2018 - 11:55am
key generation
wearables security
Wearable devices
wearable computers
Sports Activity Data
Software
sensors
security
Scalability
Resiliency
resilience
pubcrawl
privacy
online services
Accelerometers
IOT sensors
IoT
Internet of Things
ICmetrics
ICMetric
Human behavior
Hardware
feature extraction
encryption keys
encryption
Cryptography
authentication
Apple Watch
« first
‹ previous
1
2
3
4
next ›
last »