Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
mutual authentication
biblio
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Submitted by
aekwall
on Mon, 09/28/2020 - 11:02am
Scalability
authorisation
Data Security
data privacy
distributed processing
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
privacy preservation
fuzzy set theory
public key cryptography
Security analysis
secure communication
Elliptic curve cryptography
edge computing
privacy protection
elliptic curve
mutual authentication
biomedical communication
communication channel
edge computing health monitoring system
edge computing unit
environment aware privacy-preserving authentication protocol
environment equality
environmental assessment
environmental prediction
fuzzy extractor
fuzzy synthetic evaluation model
Health monitoring system
medical edge computing
resource-limited smart devices
smart health monitoring system
temporal health index
Computing Theory and Privacy
biblio
An Improved Two Factor User Authentication Framework Based on CAPTCHA and Visual Secret Sharing
Submitted by
grigby1
on Fri, 09/11/2020 - 10:46am
Cryptography
Servers
pubcrawl
Human behavior
authentication
composability
password
visualization
captchas
CAPTCHA
Chen and Huang scheme
client-server internetworking systems
cryptanalysis
dynamic session key fur subsequent communication
enhanced user participating authenticating scheme
essential security services
information leakage attack
middle attack
mutual authentication
session key establishment
strong authentication scheme
two-factor user authentication framework
user anonymity
visual secret sharing
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by
grigby1
on Fri, 06/19/2020 - 10:49am
active deception protocol
attack resistant deception technique
authentic CRP
authentication
authentication protocol
binary channel
Buildings
challenge response pairs
Cryptographic Protocols
false PUF multiplexing
false trust
Generators
learning (artificial intelligence)
machine learning attacks
ML attack
Multiplexing
mutual authentication
physical unclonable function (PUF)
physical unclonable function-based authentication protocol
policy-based governance
Policy-Governed Secure Collaboration
Protocols
pubcrawl
PUF-based authentication method
Registers
replay attacks
resilience
Resiliency
Resistance
resource-rich server authentication
Scalability
Servers
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by
aekwall
on Mon, 03/02/2020 - 11:25am
Servers
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
authentication
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
Physical attack
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
minimum human interventions
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
biblio
Enhanced Secure Mechanism for Virtual Machine Migration in Clouds
Submitted by
grigby1
on Tue, 10/15/2019 - 1:44pm
authentication
authorisation
authorization
AVISPA tool
Cloud Computing
Cloud federations
composability
Computational modeling
computer viruses
data confidentiality
data integrity
DDoS Attacks
enhanced secure mechanism
Human behavior
live migration
live VM migration
malicious viruses
Metrics
mutual authentication
pubcrawl
replay protection
Repudiation
resilience
Resiliency
Software as a service
source nonrepudiation
unauthorized access
Virtualization
virtual machine migration
Virtual machine monitors
virtual machines
VM disk images
vulnerabilities
biblio
Flexible and Efficient Authentication of IoT Cloud Scheme Using Crypto Hash Function
Submitted by
aekwall
on Wed, 05/01/2019 - 11:42am
Preserving Privacy
mutual authentication
MITM Attack
IoT Cloud
embedded device
embedded systems
Metrics
composability
pubcrawl
Resiliency
biblio
On the Security of a Secure Anonymous Authentication Protocol for Mobile Services on Elliptic Curve Cryptography
Submitted by
aekwall
on Wed, 05/01/2019 - 11:37am
mobile services
known session-specific temporary information attack
Elliptic curve cryptography
mutual authentication
Metrics
pubcrawl
Resiliency
Scalability
biblio
Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps
Submitted by
aekwall
on Mon, 03/25/2019 - 8:57am
authentication
communication functions
composability
Cryptographic Protocols
high-quality communication
Human behavior
Internet of Things
IoT network
IoT security
key agreement
lightweight mutual authentication
low performance communication ability
low-performance sensors
Metrics
mutual authentication
performance evaluation
poor wireless communication
pubcrawl
Resiliency
sensor security
telecommunication security
Wireless communication
wireless communication devices
wireless security
wireless sensor networks
WSN security
Zigbee
biblio
Mechanisms for Mutual Attested Microservice Communication
Submitted by
grigby1
on Mon, 12/10/2018 - 10:30am
pubcrawl
composability
attestation
mutual authentication
Trustworthy Computing
trustworthiness
biblio
A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
Submitted by
grigby1
on Wed, 02/21/2018 - 12:46pm
Android (operating system)
android encryption
authentication
decryption
device to device communications
device-generated public keys
disclosure range control
Elliptic curves
embedded Android devices
embedded systems
encryption
Human behavior
Human Factors
implicit user authentication
Internet of Things
IoT (Internet of Things)
IoT applications
lightweight multireceiver encryption
message authentication
message integrity
Metrics
multi-receiver encryption
mutual authentication
pairing operations
performance evaluations
private key cryptography
pubcrawl
Public key
public key cryptography
Receivers
replay-attack prevention
resilience
Resiliency
Scalability
Schnorr
Schnorr-like lightweight identity-based partial private keys
sensitive personal data disclosure prevention
source authentication
Trusted Computing
trusted third party
1
2
next ›
last »