Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Privacy.

biblio

Visible to the public A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor

Submitted by aekwall on Mon, 01/18/2021 - 11:26am
  • IoT environments
  • Fuzzy Cryptography
  • user authentication
  • user anonymity
  • use cases
  • Privacy.
  • popular attacks
  • negative horizon
  • LightPriAuth
  • key establishment
  • insider attack
  • complementary elements
  • fuzzy extractor
  • authentication scheme
  • Smart card
  • IoT
  • ECC
  • Logic gates
  • smart cards
  • password
  • message authentication
  • authentication
  • Metrics
  • privacy
  • pubcrawl
  • Resiliency
  • Internet of Things
  • data privacy
  • Cryptography
  • Scalability
biblio

Visible to the public A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)

Submitted by grigby1 on Thu, 07/30/2020 - 2:15pm
  • Privacy.
  • Trusted Computing
  • trust model
  • trust computation
  • trust
  • telecommunication security
  • similarity model
  • similarity
  • sensors
  • security
  • Resiliency
  • resilience
  • Reliability
  • Recommendations
  • pubcrawl
  • Cloud Computing
  • mitigate badmouthing attacks
  • Metrics
  • malicious object
  • IoT security
  • IoT networks
  • IoT
  • Internet of Things
  • Human Factors
  • Human behavior
  • Data models
  • Computational modeling
  • composability
  • Collusion Attacks

Terms of Use  |  ©2023. CPS-VO