Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Mobile communication
biblio
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT)
Submitted by BrandonB on Tue, 05/05/2015 - 10:21am
eavesdropper
telecommunication security
signal processing applications
signal processing
security codes
security code
security
secure communication systems
physical layer security
OFDM
Mobile communication
flip-flops
error-free legitimate channel
codes
distortion
distort signal parameter
discrete fractional Fourier fransform
Discrete Fourier transforms
DFRFT
crosslayer
cross-layer strong mobile communication secure model
cross-layer secure communication model
cross-layer DFRFT security communication model
cross-layer
Constellation diagram
biblio
Threats in end to end commercial deployments of Wireless Sensor Networks and their cross layer solution
Submitted by BrandonB on Tue, 05/05/2015 - 10:15am
security goals
WSNSP
wireless sensor networks
wireless sensor network service providers
Wireless Sensor Network
web services
Web servers
threats
telecommunication security
standard security documents
sensor web portals
sensor portal
attacks
security attacks
security
Portals
Mobile communication
end to end commercial deployments
Department of Homeland Security
Department of Defense
cross layer solution
cross layer security solution
commercial
Availability
biblio
In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks
Submitted by BrandonB on Tue, 05/05/2015 - 9:50am
rate adaptation
Mobility First project
mobility management (mobile radio)
network protocols
non-IP protocols
offloading work
pluggable compute-layer services
programmable nodes
protocol extensions
Protocols
Mobility
rate-adaptive content delivery
Servers
service providers
service-API extensions
Streaming media
trustworthiness
video streaming
video streams
video transcoding
in-network computing
Bit rate
clean slate enhancements
cloud
compute-layer extensions
computer architecture
context-awareness
data plane
en-route service-adaptation
GENI test bed
at-scale mobility
in-network services
internet
Internet architecture
Mobile communication
mobile computing
mobile devices
mobile end-user experience
mobile wireless networks
biblio
Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore
Submitted by BrandonB on Tue, 05/05/2015 - 9:01am
password-protected keystore
Web protocols
Transport Layer Security
TOTP algorithm
TOAST scheme
TLS seed exchange
time-based OTP authentication
strong key derivation function
software-based token
Servers
security requirements
secure tunnel
Radiation detectors
PBEWithSHAANDTwofish-CBC function
authentication
one-time password
multifactor authentication cryptosystem
multifactor authentication
mobile TOTP scheme
Mobile communication
IETF RFC 6239 standard
Google
encrypted offline keystore
cryptosystems development
Cryptography
cryptographic standards
BC UBER keystore
authorisation
biblio
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
public cloud
Mobile communication
mobile computing
mobile consumers
OAuth 2.0
OAuth 2.0 protocol
one-time password generation technique
online data storage system
online stored data
Permission
Protocols
MiLAMob model
security
security mechanism
Social network services
social networking (online)
Social networking sites
storage management
Token
tokens
Yahoo
flexible user based policies
authentication
authorisation
authorization
authorization process
Cloud Computing
computing
Cryptography
Data models
encryption
Facebook
AES method
Gmail
HDFS
HDFS data access
information retrieval
IT resources
middleware
middleware-centric framework
middleware-layer framework
MiLAMob
biblio
A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme
Submitted by BrandonB on Mon, 05/04/2015 - 2:49pm
Mobile communication
telecommunication security
security
secure authentication procedure
proxy mobile IPv6
Protocols
PMIPV6 based network mobility scheme
network mobility
NEMO
MR
mobility management (mobile radio)
mobile router
mobile platforms
mobile computing
AAA servers
mobile access gateway
MAG
LMAIFPNEMO
lightweight mutual authentication mechanism
Internet access
IFP-NEMO protocol
Handover
AVISPA software
AVISPA
automated validation of internet security protocols and applications
authentication authorization and accounting
authentication
biblio
Urban traffic commuting analysis based on mobile phone data
Submitted by BrandonB on Mon, 05/04/2015 - 2:38pm
OD information
urban traffic commuting analysis
trip generation mechanism
trip attraction
traffic information systems
traffic information extraction
Statistics
Sociology
real-time systems
pattern clustering
Base stations
mobile phone data acquisition
Mobile handsets
mobile computing
Mobile communication
k-means clustering algorithm
feature extraction
data acquisition
Cities and towns
biblio
Right to silence: Establishing map-based Silent Zones for participatory sensing
Submitted by BrandonB on Mon, 05/04/2015 - 2:16pm
Mobile communication
wireless sensor networks
user privacy protection
sensors
security of data
privacy level
privacy
performance evaluation
participatory sensing
mobile phones
Mobile handsets
mobile devices
mobile computing
ban zones
map-based silent zones
location data
large-scale sensing systems
k-anonymity
habitat density
embedded sensors
dynamic map-based blinding out
data privacy
Cities and towns
cartography
Buildings
biblio
Preserving location privacy based on distributed cache pushing
Submitted by BrandonB on Mon, 05/04/2015 - 2:10pm
markov chain
Trajectory
Servers
privacy
mobility management (mobile radio)
mobile users
mobile computing
Mobile communication
Markov processes
cache storage
location privacy preservation scheme
location privacy
location based service
Distributed databases
distributed cache pushing
data privacy
computer architecture
biblio
Synergetic cloaking technique in wireless network for location privacy
Submitted by BrandonB on Mon, 05/04/2015 - 2:09pm
mobile devices
wireless network
user privacy
telecommunication services
telecommunication security
synergetic cloaking technique
Servers
query sender
query originator
probability
privacy
Performance
mobility management (mobile radio)
mobile users
mobile networks
mobile network
Ad hoc networks
Mobile communication
mobile ad hoc networks
location-based services
location service provider
location privacy
location based server
Educational institutions
Databases
data privacy
Cryptography
collaboration
cloaking area sizes
Cloaking
ad-hoc networks
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »