Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded systems
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
biblio
De Duplication Scalable Secure File Sharing on Untrusted Storage in Big Data
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
knowledge copy
knowledge deduplication
Metrics
Peer-to-peer computing
privacy issues
pubcrawl
Public key
resilience
knowledge confidentiality
Secure File Sharing
security
security issues
sensitive data
storage
Token
untrusted storage
Writing
data privacy
Big Data
ciphertexts
Cloud Computing
composability
confluent key
convergent secret writing
cryptographical hash price
Cryptography
ancient secret writing
decryption
deduplication scalable secure file sharing
embedded systems
encoding
encryption
hashkey
Human behavior
information copy
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
biblio
A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
replay-attack prevention
multi-receiver encryption
mutual authentication
pairing operations
performance evaluations
private key cryptography
pubcrawl
Public key
public key cryptography
Receivers
Metrics
resilience
Resiliency
Scalability
Schnorr
Schnorr-like lightweight identity-based partial private keys
sensitive personal data disclosure prevention
source authentication
Trusted Computing
trusted third party
encryption
android encryption
authentication
decryption
device to device communications
device-generated public keys
disclosure range control
Elliptic curves
embedded Android devices
embedded systems
Android (operating system)
Human behavior
Human Factors
implicit user authentication
Internet of Things
IoT (Internet of Things)
IoT applications
lightweight multireceiver encryption
message authentication
message integrity
biblio
The undetectable clock cycle sensitive hardware trojan
Submitted by grigby1 on Wed, 02/21/2018 - 12:41pm
Hardware
Trusted design
Trojan horses
trees (mathematics)
Resiliency
resilience
redundant circuits
pubcrawl
Microelectronic Security
Metrics
invasive software
HT
Hardware Trojans
Circuit faults
FSM
finite state machines
finite state machine
embedded systems
embedded clock-cycle-sensitive hardware trojans
delays
Cryptography chips
Cryptography
critical path
composability
Clocks
clock tree structure
biblio
Optimizing Task Assignment with Minimum Cost on Heterogeneous Embedded Multicore Systems Considering Time Constraint
Submitted by grigby1 on Wed, 02/21/2018 - 12:37pm
Processor scheduling
Guaranteed Probability
Heterogeneous Embedded Multicore System
heterogeneous embedded multicore systems
heterogeneous multicore architectures
minimum cost
multiprocessing systems
optimal energy efficiency
optimizing task heterogeneous assignment with probability algorithm
OTHAP
processor and voltage assignment with probability problem
execution time
processor scheduling algorithm
PVAP problem
real-time embedded systems
system performance model
Task Assignment
task assignment optimization
task completion probability
time constraint
multicore computing security
Multicore Computing
Program processors
pubcrawl
Scalability
Algorithm design and analysis
energy consumption
real-time systems
Reliability
directed graphs
probability
Metrics
Signal processing algorithms
resilience
embedded systems
Resiliency
battery-based embedded systems
computer systems
DAG
data-dependent aperiodic tasks
directed acyclic graph
dynamic programming
dynamic programming algorithm
Energy Efficiency
biblio
Multi-factor authentication using accelerometers for the Internet-of-Things
Submitted by grigby1 on Thu, 02/15/2018 - 10:48am
Metrics
sensor security
security of data
security harvesting
Resiliency
resilience
pubcrawl
Protocols
Pins
multifactor authentication
Multi-factor authentication
mobile devices
mobile computing
Accelerometers
IoT
Internet-of-Things
Internet of Things
Human Factors
human factor
Human behavior
Hardware
experimental embedded system
embedded systems
embedded devices
authentication
biblio
Trustworthy reconfigurable access to on-chip infrastructure
Submitted by grigby1 on Fri, 02/02/2018 - 12:29pm
security
reconfigurable scan network
reconfigurable scan networks
Registers
Resiliency
RSN
scan pattern generation method
secure DFT
secure pattern retargeting
pubcrawl
security problem
system-on-chip
trustworthiness
trustworthy access pattern generation
trustworthy access sequences
trustworthy data transmission
trustworthy reconfigurable access
Trustworthy Systems
IEEE Std 1500
composability
cyber physical systems
data communication
embedded systems
external interfaces
Hardware Security
IEEE standards
IEEE Std 1149
access mechanisms
IEEE Std 1687
IJTAG
Instruments
integrated circuit testing
JTAG
Latches
Multiplexing
on-chip embedded infrastructure
biblio
Physical unclonable functions and dynamic partial reconfiguration for security in resource-constrained embedded systems
Submitted by grigby1 on Fri, 02/02/2018 - 12:17pm
hardware-based authentication
authentication
composability
Cryptography
DPR strategy
dynamic partial reconfiguration
embedded systems
encryption
Engines
field programmable gate arrays
FPGA
ubiquitious wireless connectivity
Internet of Things
Metrics
physical unclonable functions
Protocols
pubcrawl
Resiliency
resource-constrained embedded systems
Servers
SoC-based architectures
biblio
Hardware support for embedded operating system security
Submitted by grigby1 on Fri, 02/02/2018 - 12:17pm
hardware monitor
attack
composability
Computer crime
Context
Data protection
defense
embedded operating system security
embedded OS security
Embedded System
embedded systems
field programmable gate arrays
FPGA prototype
FPGA-based prototype implementation
Hardware
hardware support
Hardware-based monitoring
Internet-connected embedded systems
Metrics
Monitoring
monitoring graph
operating system
operating systems (computers)
pubcrawl
Registers
remote hacking attacks
Resiliency
security
software-based protection mechanisms
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »