Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Security Properties
biblio
An information-theoretic security metric for future wireless communication systems
Submitted by aekwall on Thu, 04/08/2021 - 3:41pm
Measurement
quantitative analysis
information theoretic security metric
information theoretic point of view
fine-grained tuning
Abstracts
Random variables
information theoretic security
wireless communication systems
security performance
Security Properties
radio networks
Scalability
Entropy
uncertainty
Metrics
Wireless communication
policy-based governance
pubcrawl
Human behavior
Resiliency
security
telecommunication security
biblio
Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain
Submitted by grigby1 on Tue, 03/09/2021 - 1:50pm
proof-of-work blockchain
honest-majority
Human behavior
modeling analysis
network connectivity
network modeling
node behavior
Peer-to-peer computing
PoW blockchain
Probabilistic logic
honest-but-potentially-colluding
Protocols
pubcrawl
Scalability
security
security impact
security of data
Security Properties
telecommunication security
consensus voting power
Analytical models
bitcoin
blockchain
blockchain forks
blockchain system
central trusted authority
consensus protocol
consensus security
analytical model
Cryptographic Protocols
Cryptography
Data mining
design system
different adversary models
distributed consensus system
electronic money
financial data processing
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
integrated circuit
Tamarin prover
security protocols
Security Properties
Resiliency
resilience
pufs
PUF-based protocols
PUF API
pubcrawl
Protocols
physical unclonable functions
mutual authentication protocol
integrated circuits
Analytical models
hardware-based security
Hardware
formal methods and verification
fingerprint identification
error correction data
Data models
Cryptography
Cryptographic Protocols
Compositionality
application programming interface
APIs
API
biblio
Property Based Formal Security Verification for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/02/2020 - 12:35pm
Resiliency
invasive software
Logic gates
malicious Hardware Trojans
modern computer hardware
policy-based governance
pubcrawl
register transfer level information flow security models
resilience
intellectual property security
secret information
security
security behavior
Security Properties
Semantics
Theorem Proving
third-party intellectual property cores
Trojan horses
golden reference design
composability
Coq
fine grained gate level information flow model
formal representations
formal security verification
Formal Specification
formal verification
formal verification method
Complexity theory
Hardware
hardware designs
Hardware Security
hardware trojan
industrial property
information flow analysis
Integrated circuit modeling
biblio
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization
Submitted by grigby1 on Thu, 07/09/2020 - 12:58pm
Security Properties
Human behavior
Human Factors
mobile client
mobile computing
privacy
pubcrawl
public blockchain
resilience
Resiliency
Scalability
hardware-assisted transparent enclave
sensor-rich mobile devices
SGX-enabled server
smart contract
smart contracts
Task Analysis
third-party platform
transparent blockchain
trusted hardware
zero-knowledge proof
data confidentiality
blockchain
Compositionality
crowd wisdom
crowd wisdom aggregation
Crowdsensing
crowdsensing systems
Cryptography
data aggregation
Data collection
Aggregates
data deletion
data privacy
Data Sanitization
data sensing
decentralized blockchain technology
differential privacy
Distributed databases
ethereum
faulty data providers
biblio
ERAMIS: A Reference Architecture-Based Methodology for IoT Systems
Submitted by grigby1 on Fri, 05/08/2020 - 1:20pm
methodology
Software Architecture
Security Properties
security of data
security
Resiliency
resilience
reference architecture-based methodology
pubcrawl
operational security services
object-oriented programming
object oriented security
Metrics
architecture
ISO standards
IoT-enabled applications
IoT systems
IoT
Internet of Things
IEC standards
ERAMIS methodology
design features
computer architecture
composability
complexity
Business
biblio
On the Practicality of a Smart Contract PKI
Submitted by aekwall on Mon, 04/06/2020 - 9:16am
Distributed Applications
smart contract
PKI Trust Models
Additives
communication security
accumulator
blockchain-based identity systems store
centralized authorities
constant-sized state
constant-sized storage
contracts
identity records verification
live chain
main building blocks
provably secure contract
public key infrastructures
securing communications
smart contract PKI
smart contract platform
blockchain
telecommunication security
system monitoring
Resiliency
Human behavior
pubcrawl
privacy
Cryptography
Metrics
Scalability
internet
smart contracts
ethereum
public key cryptography
computational complexity
Formal Specification
software fault tolerance
Security Properties
biblio
Security in Wireless Sensor Networks: A formal verification of protocols
Submitted by grigby1 on Fri, 04/03/2020 - 11:43am
privacy
WSN technology
wireless sensor networks
telecommunication security
Security Properties
security breaches
Security analysis
security
secure transmissions
safe transmissions
real-time communications
pubcrawl
protocol verification
analyzed protocols
policy-based governance
Policy Based Governance
industrial domains
formal verification
Cryptographic Protocols
concerns security aspects
concerns improved guarantees
Compositionality
composability
complex networked control systems
collaboration
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
Submitted by aekwall on Mon, 12/02/2019 - 11:08am
robust preservation
hyperproperties
linked adversarial code
linked adversarial target code
linked source code
linked target code
liveness
low-level target language
multiple programs
noninterference
property classes
relational hyperproperties
relational properties
good programming languages
robust property preservation
secure compilation
secure compilation chain
Secure interoperability
secure linking
Security Foundations
source language
source-level abstraction
strictly stronger security guarantees
supported security goals
trace properties
compiler security
Compositionality
security of data
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
Libraries
program diagnostics
program verification
Writing
Space exploration
Security Properties
Safety
program compilers
secure code
source program
adversarial contexts
arbitrary adversarial contexts
compiled program
Computer languages
equivalent property-free
formal secure compilation criteria
full abstraction
fully abstract compilation chain
1
2
3
next ›
last »