Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
password
biblio
Keystroke Based User Authentication Using Modified Differential Evolution
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
Anomaly Detection
authentication
Human behavior
Human Factors
keystroke analysis
keystroke dynamics
Metrics
Modified Differential Evolution
password
Presses
pubcrawl
Subspace Anomaly Detection
Task Analysis
timing
Training
user authentication
biblio
Document Typist Identification by Classification Metrics Applying Keystroke Dynamics Under Unidealised Conditions
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
keystroke analysis
Typist identification
text detection
text analysis
rhythm
pubcrawl
password
Minkowski metric
Minkowski distance
Metrics
Measurement
keystroke dynamics
Chebyshev approximation
Keyboards
image classification
Human Factors
Human behavior
feature extraction
document typist identification
document image processing
Distance metrics
Databases
classification metrics
biblio
Keystroke Dynamics Using Auto Encoders
Submitted by grigby1 on Tue, 01/28/2020 - 2:35pm
Human Factors
Training
timing
stolen credentials
risk based approach
pubcrawl
password
Metrics
message authentication
machine learning
learning (artificial intelligence)
Keystrokes Dynamics
keystroke dynamics
keystroke analysis
individual user
anomalous typing patterns
Human behavior
Heuristic algorithms
fraud
feature extraction
dynamic flags
digital signatures
digital signature
Cyber Attacks
credential based authentication systems
biometrics (access control)
autoencoders
authorisation
authentication
biblio
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets
Submitted by grigby1 on Tue, 01/21/2020 - 11:36am
Human behavior
shamir secret sharing
Self-Sovereign Identity
secure management
Scalability
resilience
pubcrawl
Protocols
proof-of-concept digital wallet
practical key recovery model
password
Online banking
key recovery
identity management services
Identity management
Hyperledger Indy distributed ledger technology
authorisation
financial data processing
distributed ledger
digital wallet
digital identity management
decentralized key recovery solution
data privacy
Data models
Cryptography
cryptographic keys
cryptocurrency
cryptocurrencies
credentials
Computational modeling
blockchain
biblio
Removing Personally Identifiable Information from Shared Dataset for Keystroke Authentication Research
Submitted by grigby1 on Tue, 01/21/2020 - 11:23am
policy-based governance
keystroke dataset
keystroke dynamics
message authentication
Metrics
password
personally identifiable information
personally sensitive information
PII detection program
keystroke authentication research
privacy removal
pubcrawl
resilience
Resiliency
social security numbers
Task Analysis
text analysis
user authentication systems
Electronic mail
authentication
authorisation
bank card numbers
biometrics (access control)
collaboration
Continuous Authentication
conventional authentication methods
data privacy
arrays
free-text authentication algorithm
free-text keystroke authentication
Human behavior
identity theft
insider threat
Insider Threats
keystroke analysis
biblio
Lightweight Protection of User Identity Privacy Based on Zero-knowledge Proof
Submitted by aekwall on Mon, 01/20/2020 - 12:13pm
Scalability
Protocols
Resiliency
pubcrawl
policy-based governance
privacy
authentication
password
Proposals
data privacy
Human Factors
zero trust
biblio
On Composability of Game-Based Password Authenticated Key Exchange
Submitted by grigby1 on Wed, 12/11/2019 - 12:22pm
Secret key
Password Authenticated Key Exchange
PKI
practical interest
Protocols
provably secure PAKEs
pubcrawl
public key cryptography
public-key infrastructure
password
secure channels
secure composition guarantees
simulation models
standards
Symmetric Key Protocol
telecommunication security
weak forward secrecy
game-based models
Composition Theorem.
Computational modeling
Cryptographic Protocols
Cryptography
data payload encryption
find-then-guess model
FtG model
game theory
composability
game-based password authenticated key exchange protocols
game-based real-or-random definition
Games
higher-level applications
higher-level SKPs
message authentication
PAKE protocols
biblio
An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern Locks
Submitted by grigby1 on Tue, 11/26/2019 - 3:34pm
multiple pattern scheme
user authentication
Usable Security
usability
statistical analysis
Sensitivity
sensitive applications
Scalability
Resiliency
resilience
pubcrawl
progressive authentication
Pins
pattern locks
pattern lock
password
access levels
multiple level pattern
mobile computing
message authentication
median unlock times
low-security applications
Human Factors
human factor
Human behavior
higher-complexity pattern
graphical passwords
geriatrics
generic applications
consecutive user survey
authentication
Android pattern lock
biblio
Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security
Submitted by aekwall on Mon, 09/23/2019 - 10:25am
Predictive Metrics
wireless sensor networks
user impersonation attack
user anonymity
telecommunication security
sensor network characteristics
secure communication
Resiliency
pubcrawl
provable user authentication scheme
provable security
Protocols
privacy-preserving user authentication protocol
privacy-preserving cryptanalysis
authentication
password change phase
password
mobile devices
message authentication
Logic gates
key agreement
Internet of Things security
Internet of Things
Elliptic curves
Elliptic curve cryptography
data privacy
Cryptographic Protocols
Compositionality
biblio
A Social Engineer in Terms of Control Theory
Submitted by grigby1 on Thu, 09/05/2019 - 11:27am
password
tools
terminal model
telecommunication control
social engineering
social engineer
security of data
security
Resiliency
resilience
pubcrawl
psychology
Planning
communication algorithms
nonstochastic communication object
information security specialists
information security
human model
human factor
Handheld computers
effective communication
Control Theory
contracts
composability
communication process
communication control system
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »