Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Throughput
biblio
Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application
Submitted by aekwall on Mon, 02/10/2020 - 11:44am
piccolo encryption algorithm
4 input LUTs
64 bits block size
area optimization
ASIC
constrained RFID application
different design strategies
efficient hardware architecture
Fiestel structure
hardware design
hardware metrics
low resource applications
optimized area
Piccolo Algorithm
128 bits
piccolo lightweight algorithm
radiofrequency identification
relevant lightweight block ciphers
severe security concerns
supports high speed
Throughput.
tremendous pace
ultra-lightweight applications
variable key size
word length 64.0 bit
word length 80.0 bit
Xillinx
Microelectronics Security
security applications
field programmable gate arrays
FPGA
Cryptography
encryption
Internet of Things
telecommunication security
Hardware
Table lookup
IoT applications
smart devices
Resiliency
pubcrawl
composability
IoT
RFID
Throughput
Ciphers
security issues
Predictive Metrics
private information
word length 128.0 bit
Hardware Implementation
hardware resources
lightweight cryptographic algorithms
S-box
lightweight cryptography
biblio
Performance evaluation of lightweight Block Ciphers in soft-core processor
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
light emitting diodes
Throughput
Software
soft-core processor
Scalability
RFID devices
Resiliency
pubcrawl
PRESENT crypto ciphers
PICCOLO crypto ciphers
microprocessor chips
lightweight cryptography algorithms
lightweight cryptography
Lightweight Ciphers
lightweight blocks crypto ciphers
lightweight block ciphers
AHB bandwidth
LEON3 processor
LEON3 open source processor
LED crypto ciphers
LBlock crypto ciphers
IoT
Internet of Things
HIGHT crypto ciphers
FPGA
field programmable gate arrays
execution time
encryption
Cryptography
CPU performance
Ciphers
biblio
Improved Detection and Mitigation of DDoS Attack in Vehicular ad hoc Network
Submitted by aekwall on Wed, 12/18/2019 - 2:23pm
routing overhead
DDoS attack mitigation
vehicular ad hoc network
VANETs Security
NS-2
network packet loss
network environment
mobile ad hoc networks
greedy approach
distributed denial of service attacks
attack topology
DDoS Attack
resilience
Attack detection
telecommunication network topology
attack mitigation
network throughput
Throughput
Measurement
telecommunication network routing
Metrics
vehicular ad hoc networks
VANETs
Routing
composability
pubcrawl
Human behavior
DDoS Attacks
computer network security
Computer crime
biblio
IoT Security Model and Performance Evaluation: A Blockchain Approach
Submitted by grigby1 on Tue, 12/17/2019 - 12:21pm
model construction
Throughput
theoretical data support
System performance
security risks
security problems
security of data
security model
Resiliency
resilience
Public key
pubcrawl
Predictive Metrics
performance evaluation
Packaging
blockchain
Metrics
IoT security model
InterPlanetary File System
Internet of Things
distributed large capacity storage
cyber-physical systems
cyber-physical system
Cryptography
concurrency (computers)
Concurrency
composability
blockchain-based security model
blockchain technology
biblio
A Flexible Anti-Jamming Channel Hopping for Cognitive Radio Networks
Submitted by grigby1 on Thu, 12/05/2019 - 10:56am
LAA scheme
wireless channels
traffic load
Topology
Throughput
telecommunication security
SU node
Resiliency
resilience
pubcrawl
Protocols
Oceans
Load modeling
load awareness anti-jamming channel hopping scheme
anti-jamming channel hopping protocol
Jamming
frequency hop communication
flexible anti-jamming channel hopping
Extended Langford pairing (ELP)
CRN
computer science
Cognitive Radio Security
Cognitive radio networks (CRNs)
cognitive radio networks
cognitive radio
channel hopping sequences
Anti-jamming strategy
biblio
Physical Layer Security in Wireless Information and Power Transfer Millimeter Wave Systems
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
SWIPT
resilience
Resiliency
secrecy performance
secrecy probability
secure transmission performance
simulation results
simultaneous wireless information
stochastic geometry framework
reliable transmission performance
Switches
telecommunication network reliability
telecommunication security
Throughput
wireless channels
Wireless communication
wireless sensor networks
Communication system security
pubcrawl
probability
power transfer millimeter wave ultra-dense network
power transfer millimeter wave systems
physical layer security performance
physical layer security
network parameters
Millimeter-wave (mmWave)
Metrics
Information rates
energy-information coverage probability
energy coverage
effective secrecy throughput
confidential information rate
composability
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
biblio
Covert Communication Under Channel Uncertainty and Noise Uncertainty
Submitted by grigby1 on Thu, 09/05/2019 - 11:25am
low probability of detection communication
user privacy protection
uncertainty
Throughput
telecommunication security
signal transmission
Signal to noise ratio
Scalability
resilience
receive SNR
Rayleigh fading channel
Rayleigh channels
Probability density function
noise uncertainty
noise power
average probability
Gain
fading channels
error statistics
eavesdropper
Data protection
covert throughput loss
covert throughput gain
covert communication
covert channels
Compositionality
channel uncertainty
channel gain
Channel estimation
average probability of detection error
biblio
RMDD: Cross Layer Attack in Internet of Things
Submitted by grigby1 on Mon, 08/26/2019 - 11:10am
PAN
Throughput
telecommunication network topology
TCP
stealthy attack
single protocol layer
Simultaneous attack
security
RPL
Routing protocols
Routing
Resiliency
resilience
rank manipulation and drop delay cross-layer attack
pubcrawl
6LoWPAN
IPv6
IoT
Internet of Things
intensity attack
intelligent attack
DODAG
DAG
cross-layer
Cross Layer Security
coordinated attack
computer network security
composability
brutal attack
biblio
Mitigating wormhole attack in MANET using absolute deviation statistical approach
Submitted by aekwall on Mon, 06/10/2019 - 10:16am
MANET Attack Mitigation
wormhole attack mitigation
wormhole attack
Throughput
telecommunication security
telecommunication network routing
Resiliency
pubcrawl
Peer-to-peer computing
mobile ad hoc networks
Metrics
MATLAB simulator
absolute deviation
MANET
fake tunnel
covariance
correlation methods
correlation coefficient
Correlation
composability
Color
AD correlation
absolute deviation statistical approach
absolute deviation correlation coefficient
« first
‹ previous
…
12
13
14
15
16
17
18
19
20
next ›
last »