Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confidentiality
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 12:24pm
public cloud storage
internet
outsourcing
outsourcing protocol
Policy
privacy
Privacy Policies
Protocols
pubcrawl
integrity
QP Protocol
Quadratic programming
Scalability
secure outsourcing
secure protocol
security of data
storage management
clients cloud provider
information technology
Human behavior
encryption
data storage
data security correctness
data privacy
data confidentiality
confidentiality
computer user
computer system
cloud technology
cloud computing technology
cloud computing data storage technology
Cloud Computing
cloud access
biblio
Fitness Trackers: Fit for Health but Unfit for Security and Privacy
Submitted by grigby1 on Mon, 04/02/2018 - 12:55pm
security and privacy
malicious user setting
Monitoring
privacy
Protocols
pubcrawl
resilience
Resiliency
Scalability
Human behavior
Servers
smart devices market
smart phones
target tracking
vital security analysis
wearable computers
Wearable devices
wearables security
data integrity
Activity/Health data
authenticity
Cloud Computing
cloud-based services
condition monitoring
confidentiality
customers
Data integration
activity monitoring solutions
data privacy
encryption
erroneous data analytics
fitness trackers
fitness tracking products
health care
health monitoring
biblio
Secure Cloud Storage and File Sharing
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
secure file sharing mechanism
online cloud services
pubcrawl
re-encryption
resilience
Resiliency
seamless file sharing technique
secure cloud storage
secure data-storage services
Secure File Sharing
native machines
security
security failure rates
security risks
security tools
Servers
sophisticated techniques
storage management
storage necessities
storage space
data maintenance
Cloud Computing
cloud service provider
cloud storage service providers
complex techniques
composability
computing resources
confidentiality
Cryptography
data integrity
Access Control
DIP
disintegration protocol
elastic data-storage services
encryption
encryption key
enormous volumes
Fingerprint recognition
Human behavior
Metrics
biblio
Using Security Invariant To Verify Confidentiality in Hardware Design
Submitted by grigby1 on Tue, 02/27/2018 - 2:34pm
composability
confidentiality
downgrading
Hardware Security
model checking
noninterference
pubcrawl
safety property
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 2:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
biblio
An android application to secure text messages
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Mobile handsets
text-based communication type
text messages security
text messages
text analysis
Software
SMS
smart phones
short message service
Senior citizens
security of data
Scalability
Resiliency
resilience
pubcrawl
mobile phone users
Android (operating system)
mobile computing
Metrics
message content
Human Factors
Human behavior
graphical user interfaces
graphical user interface
encryption
electronic messaging
Elderly
confidentiality
communication
android encryption
Android application
biblio
A Formal Foundation for Secure Remote Execution of Enclaves
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Microelectronics Security
composability
confidentiality
Enclave Programs
formal verification
integrity
Metrics
Microelectronic Security
pubcrawl
Remote Attestation
resilience
Resiliency
Secure computation
biblio
Confidentiality and Authenticity in a Platform Based on Network-on-Chip
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
network performance
SoCIN-based systems
silicon overhead
Security Properties
security mechanisms
security aspects
security
Scalability
Resiliency
resilience
reference multicore platform
pubcrawl
Program processors
processing elements
networks-on-chip
network-on-chip
advanced encryption standard
network level
Network interfaces
multiprocessing systems
multicore computing security
Multicore Computing
Metrics
Many-core systems
low-cost interconnect architecture
encryption
Cryptography
confidentiality
computer architecture
authenticity
AES model
biblio
An enhanced cryptographic model based on DNA approach
Submitted by grigby1 on Tue, 01/23/2018 - 2:53pm
Asymmetric Encryption
authenticity
Ciphers
confidentiality
Cryptography
data communication
decryption
DNA
DNA computing
DNA cryptography
encryption
Human behavior
Metrics
privacy
pubcrawl
Resiliency
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »