Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Libraries
biblio
Information Flow Control for Distributed Trusted Execution Environments
Submitted by aekwall on Mon, 01/20/2020 - 11:45am
encryption
untrusted host
Trusted Computing
TEE
Resiliency
pubcrawl
Protocols
Predictive Metrics
messages authentication
Libraries
information-flow-control
Information Flow Control
high-level abstractions
high-integrity messages
Fabrics
encryption audits
-distributed-systems
distributed trusted execution environments
distributed programming
DFLATE
data integrity
Cryptography
cryptographic mechanisms
core security calculus
confidential messages
Compositionality
Calculus
-trusted-execution-environment
-security
-language-based-security
-enclaves
biblio
Arithmetic Circuit Homomorphic Encryption and Multiprocessing Enhancements
Submitted by aekwall on Mon, 12/30/2019 - 12:36pm
Homomorphic encryption
TFHE library
OpenMP
multiprocessing enhancements
multiplication operation
MPI
latency reduction
Boolean Circuit
arithmetic operations
arithmetic circuit homomorphic encryption
Arithmetic Algorithm
arithmetic
adders
Informatics
Cloud Computing
multiprocessing systems
Registers
Human Factors
cloud services
Logic gates
Libraries
Metrics
pubcrawl
Resiliency
encryption
Cryptography
Scalability
biblio
Reducing attack surface corresponding to Type 1 cross-site scripting attacks using secure development life cycle practices
Submitted by aekwall on Mon, 12/16/2019 - 2:17pm
malware
XSS
Web users
Web sites
Web server
Web response
Web request
Web based application vulnerabilities
Uniform resource locators
secure development life cycle practices
Scalability
resilience
pubcrawl
online front-ends
nonpersistent cross-site scripting attack
non-persistent
attack
malicious links
malicious functions
Libraries
legitimate Web site
Internet based application
internet
Human behavior
encoding
cross-site scripting
Cross Site Scripting
clients Web browser
client-side code injection attack
Browsers
attack surface
biblio
MeetCI: A Computational Intelligence Software Design Automation Framework
Submitted by grigby1 on Mon, 12/09/2019 - 2:01pm
MeetCI
XML file
XML
tools
specific supported functionality
software implementation process
software engineering
Software design automation
Software algorithms
Software
Security Evaluation
Recurrent neural networks
recurrent neural nets
public domain software
pubcrawl
open source software framework
application design decisions
machine learning domains
machine learning
Libraries
learning (artificial intelligence)
language compatibility
expert systems
expert system
Cryptography
computational intelligence techniques
computational intelligence software design automation framework
computational intelligence libraries
computational intelligence
Compositionality
composability
CI users
biblio
Formally Verified Cryptographic Web Applications in WebAssembly
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
verification
Protocols
pubcrawl
public domain software
Resiliency
Scalability
security-critical software
Servers
Signal
sophisticated custom cryptographic components
standard protocols
standards
toolchain
program verification
verification techniques
verification-oriented programming languages
verified cryptographic Web applications
verified HACL cryptographic library
verified implementation
verified-software
web-security
Webassembly
WebAssembly compilers
WebAssembly version
whatsapp
formal verification
Browsers
CoMP
compilation pipeline
compiler
compiler security
Compositionality
cryptographic code
Cryptographic Protocols
cryptographic-library
cryptographic-protocol-verification
Cryptography
authoring languages
high-assurance cryptographic libraries
high-profile attacks
instruction set
Java
JavaScript runtimes
Libraries
low-level subset
Metrics
modern Web applications
program compilers
program diagnostics
biblio
Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation
Submitted by aekwall on Mon, 12/02/2019 - 12:08pm
robust preservation
hyperproperties
linked adversarial code
linked adversarial target code
linked source code
linked target code
liveness
low-level target language
multiple programs
noninterference
property classes
relational hyperproperties
relational properties
good programming languages
robust property preservation
secure compilation
secure compilation chain
Secure interoperability
secure linking
Security Foundations
source language
source-level abstraction
strictly stronger security guarantees
supported security goals
trace properties
compiler security
Compositionality
security of data
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
Libraries
program diagnostics
program verification
Writing
Space exploration
Security Properties
Safety
program compilers
secure code
source program
adversarial contexts
arbitrary adversarial contexts
compiled program
Computer languages
equivalent property-free
formal secure compilation criteria
full abstraction
fully abstract compilation chain
biblio
What You Get is What You C: Controlling Side Effects in Mainstream C Compilers
Submitted by aekwall on Mon, 12/02/2019 - 12:07pm
language security
compiler performance
compiler upgrade
compiler writers
compilers
constant-time
CPUs
crypto code
cryptographic algorithm
cryptographic protocol security
erasing
implicit properties
compiler optimizations
LLVM
mainstream C compilers
secure code
Security Engineers
side channels
side effects
stack
timing channel
zeroing
compiler security
timing
Cryptography
Cryptographic Protocols
Program processors
Resiliency
pubcrawl
Metrics
standards
optimization
Libraries
optimisation
program verification
Scalability
Security Properties
Compositionality
program compilers
C
C abstract machine
C++ language
careful programmer
Clang
compiler commands
Compiler Optimization
biblio
Design of Generic Verification Procedure for IIC Protocol in UVM
Submitted by grigby1 on Tue, 11/12/2019 - 4:29pm
SDA(Serial data line)
Monitoring
policy-based governance
privacy
product development
program verification
protocol verification
Protocols
pubcrawl
SCL(Serial clock line)
Mentor graphic Questasim 10.4e
standard method
Synchronization
Universal Verification Methodology
UVC(Universal verification component)
UVM
UVM(Univeral verification methodology)
Verilog
Vivado
field buses
APB(Advanced peripheral bus)
bugs
Clocks
code coverage
collaboration
composability
Compositionality
Conferences
DUT(Design under test)
Aerospace electronics
functional coverage
generic verification procedure
hardware description languages
Hardware design languages
IIC bus protocol
IIC controller
IIC protocol
Libraries
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Security by Default
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Libraries
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
cryptographic hash functions
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
coding theory
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
biblio
Increase Capacity of QR Code Using Compression Technique
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
error correction codes
storage management
smart cities
RGB color technique
Resiliency
QR–Code
QR codes
QR code decoder application
pubcrawl
Multi color QR code
Memory
Libraries
Image color analysis
bank data processing
encoding
e-wallet companies
demonetization step
Decoding
data storage capacity
data compression
cyber physical systems
Cryptography
compression technique
cashless society
barcode
Bar codes
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
next ›
last »