Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resilience
biblio
Lightweight Encryption Algorithm Based on Modified XTEA for Low-Resource Embedded Devices
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Microelectronics Security
composability
lightweight block cipher
Linear Feedback Shift Register (LFSR)
low-resource embedded devices
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
Security analysis
software implementation
XTEA
biblio
A Formal Foundation for Secure Remote Execution of Enclaves
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Microelectronics Security
composability
confidentiality
Enclave Programs
formal verification
integrity
Metrics
Microelectronic Security
pubcrawl
Remote Attestation
resilience
Resiliency
Secure computation
biblio
Side-channel collision attack based on multiple-bits
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
AES
Algorithm design and analysis
collision attack
composability
encryption
Euclidean distance
field programmable gate arrays
Hardware
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
Side-channel attack
side-channel attacks
biblio
Enhancing magnetic IEDs detection method utilizes an AMR-based magnetic field sensor
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Magnetometery
Resiliency
resilience
pubcrawl
Perpendicular magnetic anisotropy
Nonlinear distortion
Microelectronic Security
Metrics
Magnets
AMR sensor
Magnetometers
magnetic devices
Magnetic circuits
Iterations
Improvised Explosive Device (IED)
composability
calibration
biblio
Reliability, availability and security of computer systems supported by RFID technology
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
quantitative indicators
software reliability
Software
security of data
security
RFID technology
Resiliency
resilience
Reliability
radiofrequency identification
composability
pubcrawl
Microelectronic Security
Metrics
Hardware
Computers
computer systems security
computer systems reliability
computer systems availability
computer system quality
biblio
A novel transition effect ring oscillator based true random number generator for a security SoC
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Metrics
true random number generator
transition effect ring oscillator
system-on-chip
security SoC
Ring oscillators
Resiliency
resilience
random number generator
random number generation
pubcrawl
Oscillators
Microelectronic Security
Stochastic Computing Security
Layout
Inverters
FPGA
field programmable gate arrays
entropy source
Entropy
delays
composability
CMOS ASIC process
balanced TERO TRNG
application specific integrated circuits
Altera Cyclone series FPGA platform
biblio
An enhanced three-layer clustering approach and security framework for battlefeld surveillance
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
protocol architecture
wireless sensor networks (WSNs)
wireless sensor networks
time division multiple access
three-layer hierarchical clustering approach
three-layer clustering approach
telecommunication security
security mechanism
security framework
security
Routing protocols
Routing
Resiliency
resilience
residual energy routes
pubcrawl
battlefeld surveillance
pattern clustering
network lifetime
military computing
Microelectronic Security
Metrics
malicious node
layered architectures
hierarchical works
hierarchical clustering based approach
hierarchical based formation
Energy Efficiency
energy consumption
EHCA
composability
Clustering algorithms
biblio
Secure key management for 5G physical layer security
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
Scalability
next generation 5G wireless networks
parity check codes
passive eavesdropper
Physical layer
physical layer security
pubcrawl
resilience
Resiliency
network security
secure key management
Signal to noise ratio
telecommunication security
unsecured wireless medium
very high error probability
Wireless communication
wiretap channel
LDPC codes
Communication system security
Correlation
diversity order
eavesdropping channels
error statistics
Human behavior
key management
LDPC
5G mobile communication
legitimate communication parties
legitimate receiver
legitimate transmitter
legitimate users
low density parity check codes
Metrics
mobility management (mobile radio)
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
IEEE 802.11s
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
cryptographic keys
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
computer network security
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
Access Control
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
biblio
Security in a Distributed Key Management Approach
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
key management
user-specific keys
single-tenant scenario
Servers
sensitive data
Scalability
Runtime
Resiliency
resilience
pubcrawl
privacy breach data
outsourcing
Metrics
application providers
Key Distribution
Human behavior
encryption
distributed key management approach
Databases
data privacy
data owners
Cryptography
Cloud Security
cloud provider
Cloud Computing
classified records
« first
‹ previous
…
669
670
671
672
673
674
675
676
677
…
next ›
last »