Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart phones
biblio
Multiple Layered Security Analyses Method for Cryptocurrency Exchange Servicers
Submitted by aekwall on Mon, 09/21/2020 - 3:35pm
malicious attacks
telecommunication security
static analysis
smartphone apps
smart phones
Semantics
semantic analysis
security
Resiliency
pubcrawl
multiple layered security analyses method
Androids
internet
Humanoid robots
dynamic analysis
cryptocurrency exchangers
cryptocurrency exchange servicers
cryptocurrency
cryptocurrencies
Cross Layer Security
composability
business trading
biblio
Gestures Based CAPTCHAs the Use of Sensor Readings to Solve CAPTCHA Challenge on Smartphones
Submitted by grigby1 on Fri, 09/11/2020 - 11:43am
security mechanism
Usability.
sensor readings
network resources
gyroscopes
gyroscope data
gestures
gesture CAPTCHA challenge
CAPTCHA
Accelerometers
accelerometer readings
captchas
malware
usability
gesture recognition
security of data
Smartphones
mobile devices
smart phones
human computer interaction
Mobile handsets
invasive software
mobile computing
composability
performance evaluation
Human behavior
pubcrawl
Servers
security
biblio
Iot Based Bluetooth Smart Radar Door System Via Mobile Apps
Submitted by grigby1 on Fri, 09/04/2020 - 4:27pm
Mobile Apps
Android mobile phone
authentication method
Bluetooth protocol
bluetooth smart radar door system
industrial revolution 4.0
intelligent device
intertnet of things
microcontroller
Android devices
mobile Bluetooth module
processing software
Radar
remote voice control
Smart Door Lock
smart door lock system
wireless connection protocol
bluetooth security
cyber physical systems
Protocols
mobile devices
pubcrawl
composability
Resiliency
resilience
Human behavior
home automation
Internet of Things
microcontrollers
object detection
security system
smart phones
Bluetooth
Cyber Physical System
Android (operating system)
biblio
Obfuscatable Anonymous Authentication Scheme for Mobile Crowd Sensing
Submitted by grigby1 on Fri, 09/04/2020 - 4:17pm
pubcrawl
mobile crowd sensing
mobile crowd sensing (MCS)
mobile devices
obfuscatable anonymous authentication scheme
obfuscation
privacy
privacy concerns
private authentication key
mobile computing
resilience
Resiliency
sensed data
sensor fusion
sensors
smart phones
special anonymous authentication scheme
anonymous authentication
Mobile Application
Metrics
MCS
insider attacks
information collection
encryption
device capture attacks
Cryptographic Protocols
composability
black box encryption
Batch verification
authentication requests
authentication request algorithm
authentication
anonymous authentication schemes
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
Mobile augmented reality based on cloud computing
Submitted by grigby1 on Fri, 08/28/2020 - 12:32pm
image preprocessing
transmission cost reduction
smart phones
Servers
Scalability
resilience
rendering (computer graphics)
pubcrawl
privacy
performance evaluation
Mobile handsets
mobile device
mobile computing
mobile augmented reality rendering system
image resizing
Android smart phone
image matching
image corner detection
image capturing
Human behavior
feature comparisons
fast corner detection
edge detection
Databases
Cloud Computing
Chunghwa Telecoms hicloud
Cameras
Books
book spine matching
augmented reality
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 11:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
Android-Based Smartphone Authentication System Using Biometric Techniques: A Review
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
Face
android encryption
smartphone information leakage
performance index
mobile internet
identity authentication systems
encryption technology
Biometric Recognition
Android-based smartphone authentication system
Android-based biometric verification systems
Android OS accounts
android operation system
algorithmic framework
Metrics
biometric
biometric techniques
Scalability
Humanoid robots
Androids
Android (operating system)
Information Assurance
biometrics (access control)
authentication
smart phones
pubcrawl
Human behavior
Resiliency
feature extraction
Support vector machines
mobile computing
Cryptography
authorisation
biblio
Extreme SDN Framework for IoT and Mobile Applications Flexible Privacy at the Edge
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
prominent network interface
Mobile communication
WLAN
Metrics
Android devices
application usage information
encrypted wireless traffic
Internet gateways
lightweight programmable privacy framework
PrivacyGuard framework
edge
software defined network-like paradigm
traffic shaping
WiFi encryption
WiFi links
WiFi networks
wireless network edge
wireless traffics
android encryption
Cryptography
Scalability
telecommunication traffic
Internet of Things
software defined networking
Resiliency
Human behavior
pubcrawl
privacy
IoT
smart phones
Mobile Applications
wireless LAN
Wireless fidelity
Software Defined Network
Wireless communication
mobile device
sensitive information
biblio
Server-Side Fingerprint-Based Indoor Localization Using Encrypted Sorting
Submitted by aekwall on Mon, 08/10/2020 - 10:33am
malicious individuals
localization
indoor radio
Android app
Buildings
Columbia University dormitory
Fingerprinting
GPS signals
homo-morphic cryptographic schemes
Indoor environments
Metrics
server computation capabilities
server-side fingerprint-based indoor localization
socialist millionaire problem
unique encrypted sorting capability
Wi-Fi
Wi-Fi access points
wireless signals
android encryption
pubcrawl
Servers
Cryptography
encryption
data privacy
telecommunication security
Protocols
mobile computing
Resiliency
Human behavior
Scalability
privacy
Databases
smart phones
wireless LAN
Wireless fidelity
Homomorphic encryption
efficiency
fingerprint identification
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »