Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security mechanisms
biblio
Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM)
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
mobile agent system
Trusted Platfrom Modules
trusted platform modules
tpm
Task Analysis
software agents
software agent usage approach
security of data
security mechanisms
security experts
secure protocol
Resiliency
pubcrawl
Protocols
mobile agents
agent based system builders
malicious host
Java agent development framework
Java
JADE
Hardware Protection
eminent scientific community
Data processing
Cryptography
Conferences
computing problems
computing paradigm
composability
Agent Protection
biblio
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
Safety
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TPMs
tpm
system manipulation
Software
security of data
security mechanisms
security
secure elements
Availability
Resiliency
Reliability
Redundancy
pubcrawl
Industry 4.0
Hardware
embedded systems
dependability features
cyber-physical systems
cyber-attacks
cyber physical systems
composability
biblio
A Robust Anonymity Preserving Authentication Protocol for IoT Devices
Submitted by grigby1 on Thu, 01/31/2019 - 12:19pm
message authentication
telecommunication security
Servers
security mechanisms
robust anonymity preserving authentication protocol
Resiliency
resilience
radiofrequency identification
public key cryptography
pubcrawl
Protocols
privacy
online threat
Metrics
anonymity
lightweight authentication
IoT devices
Internet of Things
Human Factors
Human behavior
Generators
efficient public key cryptography mechanism
ECC
data privacy
Cryptographic Protocols
composability
authentication
biblio
Prevention of denial of service attack over vehicle ad hoc networks using quick response table
Submitted by grigby1 on Wed, 06/20/2018 - 12:39pm
Throughput
Resiliency
Routing
Routing protocols
secure communication
Secure Routing
security
security mechanisms
security threat
Sybil attack
threats
resilience
tunnels
V2I
V2V
VANET
vehicle ad hoc networks
vehicular ad hoc networks
wireless
wireless adhoc network
Wireless communication
gray hole
attack prevention
black hole
Bridges
common attacks
Compositionality
computer network security
delays
denial of service attack
DoS
dynamic topology
Analytical models
high mobility environment
infrastructure based network
MANET
Metrics
Mobile adhoc Network
network performance
packet drop
pubcrawl
quick response table
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
Performance Evaluation of Cryptography on Middleware-Based Computational Offloading
Submitted by grigby1 on Mon, 06/11/2018 - 3:47pm
mobile cloud computing paradigm
collaboration
malicious attacks
power consumption
policy-based governance
computational
computational offloading
critical data
data authenticity
mobile cloud computing
Policy
mobile cloud infrastructure
mobile cloud servers
Offloading
offloading operations
resource-intensive applications
saving processing
smartphone offloads
wireless access media
middleware security
mobile computing
security
pubcrawl
Reliability
composability
Cryptography
Mobile communication
encryption
Cloud Computing
Servers
resilience
security mechanisms
resource allocation
data integrity
mobile devices
performance evaluation
middleware
hardware resources
Resiliency
biblio
Patient Infusion Pattern based Access Control Schemes for Wireless Insulin Pump System
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
learning (artificial intelligence)
wireless sensor networks
wireless insulin pump system
Wireless insulin pump
Wireless communication
Universal Serial Bus
supervised learning approaches
single acute overdose
security mechanisms
regression models
regression analysis
PIPAC
patient safety
patient infusion pattern based access control schemes
Access Control
Insulin
infusion pattern
implantable medical devices
hospitals
home healthcare systems
health care
Diabetes
Communication system security
chronic overdose
bolus abnormal dosage detection
basal abnormal rate detection
authorisation
1536086
biblio
Confidentiality and Authenticity in a Platform Based on Network-on-Chip
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
network performance
SoCIN-based systems
silicon overhead
Security Properties
security mechanisms
security aspects
security
Scalability
Resiliency
resilience
reference multicore platform
pubcrawl
Program processors
processing elements
networks-on-chip
network-on-chip
advanced encryption standard
network level
Network interfaces
multiprocessing systems
multicore computing security
Multicore Computing
Metrics
Many-core systems
low-cost interconnect architecture
encryption
Cryptography
confidentiality
computer architecture
authenticity
AES model
biblio
Autonomic Identity Framework for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 1:22pm
party identity providers
Internet of Things
intrinsic digital properties
IoT entity
IoT smart homes
IoT unconventional characteristics
low level identities
Metrics
mobile devices
Mobility
Monitoring
Object recognition
internet
pubcrawl
Resiliency
Scalability
security
security mechanisms
security of data
Self-Discovery
smart buildings
Smart Home
Smart homes
digital signatures
airplanes
authorisation
Autonomic computing
autonomic identity framework
Autonomic Security
blockchain
current centralized identity management systems
Cyber-security
data privacy
digital identity concept
advanced information services
discrete wavelet transforms
domestic appliances
electrical grids
exponential number
gas plants
heterogeneity
Home appliances
Identity management
identity self-management
interconnected devices
biblio
Security threat identification using energy points
Submitted by grigby1 on Mon, 12/04/2017 - 12:58pm
pubcrawl
software engineering
software development lifecycle
Software
security threat identification
security process
security of data
security mechanisms
security breaches
SDLC
Scientific Computing Security
Resiliency
Central Processing Unit
Power demand
power aware computing
Metrics
energy points
energy consumption
energy based denial of service attacks
DoS attack
cosmic Method
Computers
Computer crime
Compositionality
« first
‹ previous
1
2
3
4
next ›
last »