Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resilience
biblio
Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
secondary causes
program diagnostics
program verification
proximate causes
pubcrawl
related dynamic properties
resilience
Resiliency
rigorous definitions
Scalability
program debugging
soft-ware weaknesses
Software
software vulnerabilities
software weaknesses
taxonomy
tertiary causes
unambiguous definitions
verification bugs
VRF
cryptography related classes
authentication
attacks
bug classes
Bug taxonomy
bugs framework
clear descriptions
Computer bugs
Cryptography
cryptography classes
BF taxonomy
developed BF classes
ENC
encryption
Encryption bugs
Human behavior
key management
key management bugs
KMN
Metrics
biblio
Identity-based cryptography (IBC) based key management system (KMS) for industrial control systems (ICS)
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
Internet world
security services
secure communication channels
Scalability
Resiliency
resilience
pubcrawl
Protocols
production engineering computing
process monitoring
process control
Monitoring
Metrics
KMS
key management
Access Control
internet
integrated circuits
industrial process
Industrial Control Systems
ICs
IBE
IBC
Human behavior
efficient key management system
cyber security challenges
cyber security
Cryptography
authorisation
authentication
biblio
Search Lookaside Buffer: Efficient Caching for Index Data Structures
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
resilience
pubcrawl
Resiliency
Human behavior
Scalability
key management
Metrics
caching
index data structure
Key-value Store
biblio
Cryptographically Secure Information Flow Control on Key-Value Stores
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
digital signatures
Cryptography
Human behavior
information-flow control
key management
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
A Cross-Layer Key Establishment Model for Wireless Devices in Cyber-Physical Systems
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
physical layer security
cross-layer
cyber-physical systems
Human behavior
key establishment
key management
Metrics
pubcrawl
resilience
Resiliency
Scalability
security
wireless devices
biblio
Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
big-key cryptography
bounded retrieval model
Human behavior
key exfiltration
key management
Metrics
pubcrawl
resilience
Resiliency
Scalability
biblio
Polynomial-based Key Management Scheme for Robotic System
Submitted by grigby1 on Wed, 02/21/2018 - 1:39pm
cyber physical security
Human behavior
key management
Metrics
pubcrawl
resilience
Resiliency
Robotic system
Scalability
biblio
Secure Hierarchy-Aware Cache Replacement Policy (SHARP): Defending Against Cache-Based Side Channel Atacks
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
security
resilience
pubcrawl
Scalability
Metrics
Resiliency
cache
Cache replacement
Side Channel
multicore computing security
Multicore Computing
biblio
Acceleration of RSA processes based on hybrid ARM-FPGA cluster
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
resilience
MPI
Multicore Computing
multicore computing security
multicore desktop
multiprocessing systems
node-to-node communication
none-subtraction Montgomery algorithm
Program processors
pubcrawl
public key cryptography
microprocessor chips
Resiliency
RSA
RSA algorithm
RSA processes acceleration
Scalability
software-hardware cooperation
system-on-chip
Xilinx Zynq SoC
Zynq
FPGA fabric
Algorithm design and analysis
ARM CPU
Chinese remainder theorem
cluster
cluster infrastructure
Clustering algorithms
computer architecture
CRT
field programmable gate arrays
Acceleration
Hardware
Heterogeneous
hybrid architectures
hybrid ARM-FPGA cluster
Intel i7-3770
many-core server
message passing
message passing interface
Metrics
biblio
Multicore implementation of EME2 AES disk encryption algorithm using OpenMP
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
multicore computing security
standards
Speed up
Software algorithms
Scalability
Resiliency
resilience
pubcrawl
Organizations
multiprocessing systems
Multicore processing
multicore implementation
AES
Multicore Computing
multicore compatible parallel implementation
Metrics
full disk encryption
encryption
Encrypt Mix Encrypt V2 Advanced Encryption Standard
EME2 AES disk encryption algorithm
EME2 AES
Cryptography
computational complexity
« first
‹ previous
…
670
671
672
673
674
675
676
677
678
…
next ›
last »