Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
Continuous and Transparent User Identity Verification for Secure Internet Services
Submitted by BrandonB on Wed, 05/06/2015 - 2:44pm
authentication
bioinformatics
mobile environments
Protocols
security
Servers
smart phones
Web servers
web services
biblio
Personalized authentication procedure for restricted web service access in mobile phones
Submitted by BrandonB on Wed, 05/06/2015 - 11:09am
mobile computing
web services
smart phones
Servers
security
restricted Web service access
personalized authentication procedure
performance evaluation
multilevel authentication procedure
Multi-Level Authenticatio
mobile phones
Mobile handsets
authentication
Mobile communication
malware intrusions
internet
face recognition
biometrics (access control)
biometric signature acquisition device
Biometric Recognition
biometric face recognition
biometric capture device
authorisation
biblio
Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes
Submitted by BrandonB on Wed, 05/06/2015 - 9:14am
photon-counting imaging
Optical polarization
Optical security and encryption
optical security method
optically phase encoded QR code
phase coding
photon counting
photon counting imaging
photon-counting encryption
optical masks
photon-counting security tagging
Photonics
robust read out
smart phones
speckle
speckle signature
statistical analysis
image encryption
coherent imaging
commercial Smartphone
Cryptography
decryption
full phase double-random-phase encryption
Huffman codes
Image coding
image compressing
Adaptive optics
iterative Huffman coding
Iterative methods
masks
Nonlinear optics
object authentication
Optical filters
Optical imaging
biblio
End-to-end IP mobility platform in application layer for iOS and Android OS
Submitted by BrandonB on Mon, 05/04/2015 - 1:38pm
IPv6 networks
transmission delay
Smartphones
smart phones
Servers
secure data exchange
Relays
real-time systems
real time services
OS kernel
NTMobile
network usage
network traversal with mobility
NAT routers
Manganese
Linux kernel
Android (operating system)
IPv4 networks
IP networks
iOS system
iOS (operating system)
end-to-end IP mobility platform
end-to-end communication
encryption key
encryption
electronic data interchange
Cryptography
client-server systems
client-server model
authentication
Application Layer
Android OS
biblio
Design and implementation of a mobile VoIP system on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:37pm
Mobility
VoIP service
VoIP
true mid-call mobility
sockets
socket communications
smart phones
signaling procedure
Servers
Protocols
pre-call mobility
Peer-to-peer computing
peer entity
moving users
mobility management (mobile radio)
android
mobile VoIP system
mobile users
IP networks
Internet telephony
in band signaling
graphical user interfaces
encryption
DNS
Cryptography
buffering techniques
ASP technology
Androids
Android devices
Android (operating system)
biblio
Cryptographic key generator candidates based on smartphone built-in sensors
Submitted by BrandonB on Mon, 05/04/2015 - 1:35pm
Android (operating system)
Android-based smartphones
Ciphers
cryptographic key generator candidates
cryptographic system
Cryptography
encryption
Generators
random number generation
random number generators
Random sequences
RNG
sensors
smart phones
smartphone
smartphone built-in sensors
biblio
Comparative mobile platforms security solutions
Submitted by BrandonB on Mon, 05/04/2015 - 1:28pm
mobile computing paradigm
Windows Phone
smart phones
smart phone
sensitive information
security of data
QNX
private information
mobile platform security solution
android
mobile computing
Mobile communication
Kernel
ios
encryption
comparative mobile platforms
BlackBerry
Androids
biblio
Analysis on Password Protection in Android Applications
Submitted by BrandonB on Mon, 05/04/2015 - 1:26pm
leakage
vulnerability analyzing method
Vulnerability
user privacy
taint analysis
smart phones
PW Exam
privacy
password protection
password leakage
password
mobile computing
Android applications
Humanoid robots
encryption
decompile step
data privacy
cryptography misuse detection
cryptography misuse analysis
Cryptography
API call record
Androids
Android apps
biblio
Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android
Submitted by BrandonB on Mon, 05/04/2015 - 1:25pm
Lempel-Zev-Welch technique
tiny encryption algorithm
TEA-LZW
TEA
Steganography
smart phones
security
PSNR
private key cryptography
mobile device
LZW
LSB steganography
LSB
lossless compression technique
android
least significant bit
Indexes
Image resolution
Image coding
encryption
encrypted text
Dictionaries
data compression
Cryptography
Compression
compressed text
Android (operating system)
biblio
Achieving privacy preservation in WiFi fingerprint-based localization
Submitted by BrandonB on Mon, 05/04/2015 - 1:23pm
location privacy
wireless LAN
WiFi fingerprint-based localization
smart phones
signal strengths
Servers
real-world environments
PriWFL
privacy-preserving WiFi fingerprint localization scheme
privacy
performance enhancement algorithm
mobile computing
Accuracy
localization service provider
indoor mobility prediction
indoor localization
IEEE 802.11 Standards
Homomorphic encryption
Databases
data privacy
Cryptography
computer network security
computational overhead reduction
Android smartphone
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »