Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
delay constraints
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
medium-range FPGA device
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
Hamming distance
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
counterfeiting
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
field programmable gate arrays
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:06pm
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms
biblio
A Passivity Framework for Modeling and Mitigating Wormhole Attacks on Networked Control Systems
Submitted by BrandonB on Thu, 04/30/2015 - 12:06pm
passivity
wormhole attacks
wormhole attack
wireless networks
wireless network
wireless LAN
telecommunication traffic
Silicon
Routing
resource management
passivity framework
computer network security
packet delays
networked control systems
network traffic
network flows
delays
delay constraints
cyber-physical systems
Cryptography
cryptographic mechanisms