Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
authentication
biblio
A Scalable Blockchain-based Approach for Authentication and Access Control in Software Defined Vehicular Networks
Submitted by grigby1 on Tue, 02/23/2021 - 1:58pm
Access Control
access control issues
access control mechanism
authentication
authorisation
authorization
blockchain
blockchain ledger
blockchain technology
computer architecture
control systems
cryptocurrencies
Distributed databases
heterogeneous networks
interconnected blockchain sub-networks
IoV
message authentication
Network reconnaissance
open systems
pubcrawl
resilience
Resiliency
Scalability
scalable architecture
scalable blockchain-based approach
SDN
SDN controllers
SDVN devices
SDVN features
SDVN requirements
security
security issues
software defined networking
software defined vehicular networking
software defined vehicular networks
telecommunication network planning
telecommunication security
unauthorized SDN controller
unauthorized switch
vehicular ad hoc networks
biblio
A New Homomorphic Message Authentication Code Scheme for Network Coding
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
encryption
pubcrawl
Metrics
resilience
Resiliency
message authentication
telecommunication security
authentication
composability
encoding
access protocols
network coding
Pollution
homomorphic mac
homomorphic MAC scheme
homomorphic message authentication code
known-plaintext attacks
MAC length
network data flow
packet decoding
pollution attacks
security parameter
some what homomorphic encryption
vector length
biblio
DNA based Computing Encryption Scheme Blending Color and Gray Images
Submitted by aekwall on Mon, 02/08/2021 - 12:51pm
authorisation
Cryptography
encryption
Resiliency
Human behavior
pubcrawl
matrix algebra
Image coding
Image color analysis
privacy
authentication
DNA
Fingerprint recognition
Predictive Metrics
image colour analysis
face recognition
Cipher
fingerprint identification
encryption key
image sequences
attacks
DNA cryptography
DNA computing
DNA sequence
biometric image
Blending
blending images
color images
computing method
Conversions
DNA computing algorithm
Encryption Biometric image
encryption scheme blending color
fingerprint image
gray fingerprint images
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
Elliptic curve cryptography
pubcrawl
Scalability
Resiliency
Metrics
authentication
BB84
Cloud Computing
Cryptographic Protocols
data exchange
digital signatures
elliptic curve
elliptic curve digital signature
elliptic curve digital signature algorithm (ECDSA)
Elliptic curves
malicious client
public key cryptography
quantum computing
Quantum Key Distribution
Receivers
secure cloud data communication
biblio
Mitigating Man-in-the-Middle Attack in Digital Signature
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
authentication
Conferences
confidentiality
cryptographic key pairs
Cryptography
cyber-attacks
digital era
digital signature
digital signatures
digital world
encryption
integrity
man-in-the-middle attack
message authentication
message integrity
private key cryptography
pubcrawl
Public key
public key cryptography
Resiliency
Scalability
security
sender identity
Signing
biblio
An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks
Submitted by grigby1 on Wed, 02/03/2021 - 1:01pm
attacks
authentication
browser malware-injection attacks
Cloud Computing
cloud computing security attacks
common security breaches
Flooding Attacks
Honey Pot
Honey pot (computing)
honey pot attack
honey pots
Human behavior
Human Factors
intrusion
Intrusion Detection
Intrusion Detection Systems
invasive software
malware
procedural intrusion way
pubcrawl
resilience
Resiliency
Scalability
security
security issues
Servers
specific honey pot algorithm
Virtual machining
wrapping attacks
biblio
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 1:03pm
anonymity
authentication
authorisation
AVISPA
biometrics
biometrics (access control)
biometrics based key agreement
composability
diseases
e-health
e-health systems
ECG
file servers
formal security verification tool AVISPA
formal verification
health care
health systems
healthcare services
Human behavior
medical information systems
medical servers
Medical services
message authentication
Metrics
password
pubcrawl
remote monitoring
resilience
Resiliency
Servers
Smart card
smart cards
telecare medical information systems
telemedicine
three factor user authentication
Three-factor authentication
TMIS
user anonymity
user/server communication security
biblio
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications
Submitted by grigby1 on Thu, 01/28/2021 - 12:31pm
android encryption
account theft
AES 128
android
authentication
confidential messages
Electronic mail
electronic messaging
encryption
end-to-end encryption
Fingerprint (5)
Fingerprint recognition
Human behavior
hybrid encryption
Hybrid Encryption (2)
implementation designs
Instant messaging
Instant messaging (1)
instant messaging application security
message decryption process
message security
Metrics
pubcrawl
public key cryptography
QR Code (4)
QR code implementation
resilience
Resiliency
RSA 2048
Scalability
security
Servers
two-factor authentication
Two-factor authentication (3)
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 11:52am
road safety
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
Metrics
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
improved security
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
different ECUs
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
biblio
On the Effective Capacity of an Underwater Acoustic Channel under Impersonation Attack
Submitted by grigby1 on Wed, 01/20/2021 - 3:08pm
Acoustic Fingerprints
artificial neural network
Artificial Neural Networks
authentication
authentication constraints
channel coding
composability
effective capacity
feature-based authentication
gradient methods
gradient-descent technique
GTJ method
Human behavior
impersonation attack
Kuiper belt
malicious data
malicious node
markov chain
Markov processes
neural nets
probability
pubcrawl
Quality-of-Service
resilience
Resiliency
state-transition probabilities
telecommunication computing
telecommunication security
threshold-based decoding error model
underwater acoustic
underwater acoustic channel
underwater acoustic communication
UWA channel
wireless channels
1
2
3
4
5
6
7
8
9
…
next ›
last »