Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic mechanisms
biblio
Information Flow Control for Distributed Trusted Execution Environments
Submitted by aekwall on Mon, 01/20/2020 - 10:45am
encryption
untrusted host
Trusted Computing
TEE
Resiliency
pubcrawl
Protocols
Predictive Metrics
messages authentication
Libraries
information-flow-control
Information Flow Control
high-level abstractions
high-integrity messages
Fabrics
encryption audits
-distributed-systems
distributed trusted execution environments
distributed programming
DFLATE
data integrity
Cryptography
cryptographic mechanisms
core security calculus
confidential messages
Compositionality
Calculus
-trusted-execution-environment
-security
-language-based-security
-enclaves
biblio
"Random number generation based on sensor with decimation method"
Submitted by grigby1 on Thu, 02/23/2017 - 11:39am
pubcrawl
wash-rinse-spin approach
testing random number
sensor fusion
sensor data
security
Random sequences
random sequence
random number uniform distribution
random number independence
random number generation
adversarial control
privacy
NIST
minimizing correlation
internet
Generators
decimation method
data privacy
Cryptography
cryptographic mechanisms
Correlation
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 11:06am
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 11:06am
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms