Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
password
biblio
Mitigation of hard-coded credentials related attacks using QR code and secured web service for IoT
Submitted by aekwall on Mon, 03/30/2020 - 10:39am
QR codes
SSL
security concerns
secured web service
Response code
QR code based approach
lightweight security algorithm
hard-coded credentials related attacks
Hard-coded credentials
GUI
clear text log-in id
password
IoT manufacturers
computer network security
QR code
cyber physical systems
web services
pubcrawl
Resiliency
invasive software
IoT devices
Internet of Things
Cryptography
authorisation
DDoS
biblio
Automated IT Audit of Windows Server Access Control
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
Scalability
IT Audit
IT auditing process
microsoft windows
Microsoft Windows (operating systems)
Object recognition
password
pubcrawl
Resiliency
ISO/IEC 27002:2013
Security Audits
security controls
security policies
security weaknesses
Servers
Windows Server
Windows server access control
Windows server operating system
automated IT audit
Access Control
access control violations
audit checklist
audit objectives
auditing
auditing processes
authorisation
automated audit tool
Windows Operating System Security
automated process
business data processing
data breach incidents
Human behavior
IEC standards
intrusion incidents
ISO standards
biblio
A New Three Party Authenticated Key Agreement Protocol Which Is Defiant towards Password Guessing Attack
Submitted by grigby1 on Mon, 03/02/2020 - 12:32pm
Servers
Password authentication
Password Guessing Attacks
password related attacks
private key cryptography
protocol vulnerable
Protocols
pubcrawl
Scalability
password
side channel attacks
Smart card
smart cards
Tamper resistance
tampered resistance property
telecommunication security
transaction secret values
accurate guess
off-line password guessing attack
new three party authenticated key agreement protocol
Metrics
message authentication
lost smart card
key agreement protocol
insecure channel
Human Factors
Human behavior
encryption
Cryptographic Protocols
cryptographic key agreement protocol
common session secret key
Bio-Hash
authentication
biblio
Don't Punish all of us: Measuring User Attitudes about Two-Factor Authentication
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
2FA methods
user sentiment
user attitude measurement
Usable Security
sentiment analysis
remote attacker
Remember Me setting
Duo 2FA
Brigham Young University
security
two factor authentication
two-factor authentication
password
Human Factors
message authentication
usability
pubcrawl
authorisation
biblio
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
Virtual private networks
virtual private networks connections
trustless two-factor authentication
server authentication
security component
secure web service
secure shell protocol
OpenSSH server
blockchain platform
authentication systems
authentication request
authentication purpose
two factor authentication
secret information
Human Factors
security of data
blockchain technology
password
smart contracts
message authentication
authentication
web services
internet
blockchain
bitcoin
pubcrawl
Trusted Party
Cryptographic Protocols
telecommunication security
Servers
biblio
Host Oriented Factor Normalizing Authentication Resource: More Secure Authentication for Legacy Systems
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
password
software program
scalable multifactor authentication method
legacy systems authentication
legacy systems
host oriented factor normalizing authentication resource
computer systems security
authentication model
two factor authentication
secure authentication
Multi-factor authentication
authorisation
radiofrequency identification
biometrics
authorization
security issues
Human Factors
biometrics (access control)
software maintenance
radio frequency identification
pubcrawl
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
Multi-Factor Authentication in Cyber Physical System: A State of Art Survey
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
face recognition
two factor authentication
web authentication methods
user authentication
single-factor authentication
secure authentication
Digital Multifactor authentication
Cyber Physical System
two-factor authentication
multifactor authentication
Multi-factor authentication
Servers
Human Factors
Fingerprint recognition
sensors
password
message authentication
authentication
Cryptography
pubcrawl
cyber-physical systems
authorisation
biblio
Two-factor authentication framework for private cloud
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
frequently used solution
two factor authentication
Web authentication form
unique code
two-factor authentication framework
two-factor authentication
TOTP user
TOTP authentication forms
TOTP
TFA
simple user authentication
public cloud
private cloud solutions
private cloud
Password authentication
OpenStack cloud
security
cloud providers
banking Websites
authentication module
additional field
Human Factors
password
message authentication
authentication
social networking (online)
Mobile handsets
Google
pubcrawl
Software
authorisation
Cloud Computing
biblio
Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
Submitted by grigby1 on Mon, 02/17/2020 - 4:07pm
microsoft windows
vulnerabilities
standards
SSD
solid state drives
Software
security weaknesses
security guarantees
reverse engineering
Resiliency
resilience
pubcrawl
policy-based governance
peripheral interfaces
password
bitlocker
Metrics
internal models
Human behavior
hardware-encryption
hardware full-disk encryption
Hardware
flash memories
firmware
external models
encryption software
encryption
Data protection
Cryptography
critical security weaknesses
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »