Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
smart devices
biblio
Chaining trusted links by deploying secured physical identities
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
pubcrawl
unclonable physical tokens
Trust management
trusted links
trusted link
Trust Chaining by Physical Tokens
smart devices
security of data
security chain
secured physical identities
Secret Unkown Cipher
secret unknown ciphers
Scalability
Resiliency
authentication
Protocols
physical clone-resistant identities
Object recognition
Internet of Things
intermediate node
Identity management
Human behavior
generic node authentication protocols
Cryptography
Cryptographic Protocols
clone-resistant physical identity
Ciphers
biblio
Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes
Submitted by grigby1 on Tue, 01/23/2018 - 3:45pm
message authentication
threat
smart devices
Service Access
security-critical operations
security
secure bootstrapping
Scalable Security
scalable
Scalability
pubcrawl
privacy-aware authentication scheme
privacy
network access
adversary
IoT systems
Internet of Things
integrated circuits
Electronics packaging
Device-to-device communication
data privacy
Cyber Attacks
computer bootstrapping
Cameras
Boot-IoT
authorisation
authentication
attack
biblio
Improving the security of internet of things using encryption algorithms
Submitted by grigby1 on Tue, 12/12/2017 - 1:30pm
Metrics
Software algorithms
smart devices
Security of internet of things
safety risks
Resiliency
Receivers
Radio frequency identification (RFID)
Public key
pubcrawl
privacy
advanced information technology
IoT security
Internet of Things
hybrid encryption algorithm
Hybrid algorithm
Human Factors
Human behavior
encryption
digital signatures
Cryptography
composability
biblio
Cyber security threats \#x2014; Smart grid infrastructure
Submitted by grigby1 on Mon, 11/27/2017 - 12:25pm
security of data
prosumer
Protocols
pubcrawl
R and D
Resiliency
risk evaluation process
SCADA
secure cyber infrastructure
power system security
smart devices
smart grid infrastructure
Smart Grids
smart meters
smart power grids
smart power system
Software
WANs
ICT
computer security
cyber infrastructure
cyber security
cyber security threats
cyber-attack
Demand response (DR)
denial-of-service (DoS)
electronic devices
composability
ICT driven power equipment massively layered structure
Metrics
new generation sensors
NIST
Peak Load Management (PLM)
power grid vulnerability analysis
power system framework
biblio
Securing Smart Cities Using Blockchain Technology
Submitted by grigby1 on Fri, 11/03/2017 - 11:33am
Resiliency
social infrastructures
smart devices
Smart device
Smart City
smart cities
security framework
security
secure communication
Scalability
resources utilization
blockchain
pubcrawl
privacy
physical infrastructures
information technology
information security
data privacy
business infrastructures
blockchain technology
blockchain security
biblio
Energy efficient techniques in Wireless Mesh Network
Submitted by BrandonB on Fri, 05/01/2015 - 9:45am
Logic gates
WMN
wireless network architecture
wireless mesh networks
wireless mesh network
Wireless communication
Throughput
smart devices
Routing
bandwidth hungry applications
IEEE 802.11 Standards
Evolution
energy efficient techniques
energy efficient network
Energy Efficiency
energy conservation
energy aware techniques
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Thu, 04/30/2015 - 11:53am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
biblio
Poster Abstract: Security Comes First, a Public-key Cryptography Framework for the Internet of Things
Submitted by BrandonB on Wed, 04/29/2015 - 10:47am
IoT
smart devices
security issues
safety issues
public-key cryptography
public key cryptography
Protocols
open systems
IP-based security solutions
IP networks
Acceleration
interoperability
Internet-connectivity
Internet services
Internet of Things
internet
Hardware
Engines
end-to-end communication
Cryptography
« first
‹ previous
1
2
3
4
5