Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
client-server systems
biblio
Software Ecosystem Call Graph for Dependency Management
Submitted by aekwall on Mon, 03/04/2019 - 9:49am
popular form
ecosystem-level
Ecosystems
Equifax data breach
external libraries
fine-grained dependency network
impact
indicative information
leftpad package removal
open source software libraries
packages
developers
program analysis
public domain software
software development management
software ecosystem
software libraries
software reusability
Software reuse
workspace
Automated Secure Software Engineering
call graphs
security
Software
Resiliency
pubcrawl
composability
tools
Libraries
software engineering
automated tools
security of data
centralized code repositories
client-server systems
Computer bugs
core package
counter measure
dependencies
dependency checkers
Dependency management
dependency networks
biblio
Block Level Streaming Based Alternative Approach for Serving a Large Number of Workstations Securely and Uniformly
Submitted by aekwall on Wed, 01/16/2019 - 1:08pm
scratchpad volatile memory
client workstation
client-server systems
Educational institutions
large number of clients
open source
Open Source solution
operating system
public domain software
client computer
security privacy constraints
University of Texas
user workstation security
virtualized computing
Windows clients
workstation configuration
Workstations
Windows Operating System Security
Servers
security
pubcrawl
Metrics
Resiliency
composability
Streaming media
Protocols
computer network security
data privacy
Linux
applications on-demand
Blades
block level streaming
campus computing
campus setting
Central Processing Unit
biblio
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers
Submitted by grigby1 on Thu, 06/07/2018 - 2:15pm
scalable system
PKI
privacy
privacy concerns
Protocols
Prototypes
pubcrawl
Rapid7
resilience
Resiliency
revocation
Scalability
online front-ends
security of data
Servers
space-efficient filter cascade data structure
SSL certificate revocations
SSL revocation checking
SSL Trust Models
TLS certificate revocations
TLS revocation checking
Transport Layer Security
University of Michigan
data structures
Browsers
certificate transparency
client-server systems
CRL
CRL checking
CRLite servers
CRLs
CRLSet
Cryptography
data privacy
Bloom filter
fail-closed security posture
Firefox
Google Certificate Transparency
Human behavior
internet
Metrics
OCSP
OCSP checking
OCSP Stapling
OneCRL
biblio
An Authentication Protocol for Wearable Medical Devices
Submitted by grigby1 on Mon, 04/02/2018 - 11:56am
telecommunication security
patient privacy
privacy
Protocols
pubcrawl
remote server
resilience
Resiliency
Scalability
Servers
SHA
network threats
TI CC3200 Launchpad
two-way authentication
Wearable Device
wearable device client
wearable medical devices
wearables security
Wi-Fi capable microcontroller
wireless connection
wireless LAN
wireless network communication
full-fledged security algorithm
authentication
biomedical communication
client-server systems
Communication system security
Cryptographic Protocols
data privacy
efficient authentication and encryption protocol
embedded client software
embedded systems
encryption
AES
hardware accelerated cryptography module
health care
Healthcare
Human behavior
internetconnected wearable devices
Linux computer
malicious attacks
medical computing
microcontroller
microcontrollers
biblio
Access Control for Secure Distributed Data Structures in Distributed Hash Tables
Submitted by grigby1 on Mon, 03/19/2018 - 12:35pm
Resiliency
middleware
middle-ware scheme
P2P networks
P2P overlays
Peer-to-peer computing
peer-to-peer networks
pubcrawl
resilience
Metrics
reusable security architecture
secure distributed data structures
Secure File Sharing
security issues
social networking (online)
social networks
social projects
trusted third parties
data structures
authorisation
centralized servers
client-server model
client-server systems
communication protocols
composability
computer network security
Context
Access Control
DDS
DHT
Distributed databases
distributed data storage services
distributed hash tables
encryption
file sharing
Human behavior
biblio
On implementing a client-server setting to prevent the Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext (BREACH) attacks
Submitted by grigby1 on Thu, 04/20/2017 - 11:43am
Dictionaries
Bandwidth
BREACH attack
BREACH attacks
browser reconnaissance and exfiltration via adaptive compression of hypertext attacks
Browsers
client-server setting
client-server systems
Compression
Compression algorithms
confidentiality
Cryptographic Protocols
Cryptography
data compression
Data protection
DEFLATE compression algorithm
Web traffic
encoding
encryption
fixed-dictionary compression
high-value secrets protection
HTTP compression
Network reconnaissance
plaintext
pubcrawl
Resiliency
security
security model
Servers
SSL/TLS
TLS protocol
transport protocols
biblio
A survey of Black hole attack detection in Manet
Submitted by BrandonB on Wed, 05/06/2015 - 7:56am
Mobile communication
telecommunication security
server
security
RREQ
RREP
Routing protocols
route discovery
received RREQ
radiowave propagation
peer-to-peer network
Peer-to-peer computing
network servers
mobile conferencing
academic purpose
mobile ad-hoc network
mobile ad hoc networks
military communication
MANET
Europe
emergency communication
decentralised network
client-server systems
client
black hole attack detection
Black hole attack
AODV protocol
Ad-HOC
biblio
A Framework for Secure Computations With Two Non-Colluding Servers and Multiple Clients, Applied to Recommendations
Submitted by BrandonB on Tue, 05/05/2015 - 10:51am
noncolluding external servers
Servers
secure recommender system
secure multi-party computation
secret sharing
recommender systems
Protocols
protocol specification
preprocessing phase
preprocessing
adversarial model
malicious model
Cryptography
Cryptographic Protocols
computer network security
Computational modeling
collaborative filtering
client-server systems
authentication
biblio
Catch Me If You Can: A Cloud-Enabled DDoS Defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:19am
Internet services
Web and internet services
turning victim servers
system architecture
shuffling mechanism
Shuffling
Servers
optimal reassignment strategy
network attacks
moving targets
moving target mechanism
moving target defense
large-scale DDoS attacks
IP networks
Amazon EC2
intelligent client reassignment
DDoS
computer network security
Computer crime
computer architecture
computational distributed denial-of-service attacks
cloud-enabled DDoS defense
Cloud Computing
cloud
client-to-server reassignment plans
client-server systems
attack mitigation
attack dilution strategies
biblio
Scaling IPv6 address bindings in support of a moving target defense
Submitted by BrandonB on Tue, 05/05/2015 - 10:14am
moving target defense
UDP requests
UDP echo server
transport protocols
Time factors
statistical improbability
standards
sockets
Servers
security
reconnaissance phase
Peer-to-peer computing
peer to peer scenario
networking
network security research
MT6D
bound interfaces
malicious actor
Local area networks
Kernel
IPv6 moving target defense
IPv6 address space
IPv6 address bindings
IPv6
IP networks
internet
Ethernet interface
computer network security
client-server systems
client server ratio
client server networks
« first
‹ previous
1
2
3
next ›
last »