Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resists
biblio
Integrated High Power Micro Magnets for MEMS Sensors and Actuators
Submitted by aekwall on Mon, 02/24/2020 - 10:55am
neodymium alloys
integrated high power micromagnets
iron alloys
magnetic MEMS
Magnetic separation
MEMS sensors
Micro magnets
microactuators
micromagnet arrangements
elemental semiconductors
permanent magnetic structures
remanent magnetization
Si-NdFeB
silicon frames
size 25.0 mum to 2000.0 mum
size 8.0 inch
substrate conditioning procedures
Resiliency
cleanroom environment
boron alloys
back-end-of-line compatible integration
Permanent magnets
Micromechanical devices
magnetic resonance imaging
Substrates
Surface treatment
Silicon
Magnetic flux
remanence
Compositionality
Resists
microsensors
pubcrawl
biblio
Security weakness of a lattice-based key exchange protocol
Submitted by aekwall on Mon, 08/26/2019 - 10:07am
Protocols
Metrics
MITM Attack
network security field
nonDH type key exchange protocol
NTRU-ENCRYPT
NTRU-KE
NTRU-SIGN
policy-based governance
private key cryptography
man-in-the-middle attack
pubcrawl
public key cryptography
quantum attacks
quantum computing
resilience
Resists
Secret key
security weaknesses
telecommunication security
Human behavior
Computing Technology
cryptanalysis
Cryptographic Protocols
DH problem
DH-HEMTs
Diffie-Hellman problem
digital signatures
exponential attacks
grid computing
authentication mechanism
information field
information technology
Key exchange
lattice cryptography
lattice-based key exchange protocol
Lattices
Lei
Liao
biblio
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
Submitted by grigby1 on Fri, 02/22/2019 - 4:08pm
long-term confrontation
without embedding
Transform coding
Training
trained generator neural network model
traditional embedding-based steganography
steganography detection
Steganography
state-of-the-art image steganalysis algorithms
secret information
Resists
pubcrawl
privacy
noise vector
Metrics
machine-learning-based steganalysis algorithms
Brain modeling
learning (artificial intelligence)
image SWE method
image steganography method
image generation
Image coding
generative adversarial networks
Gallium nitride
feedforward neural nets
distortion
digital images
deep convolutional generative adversarial networks
data encapsulation
coverless
composability
carrier image
biblio
Enhancing Sampling and Counting Method for Audio Retrieval with Time-Stretch Resistance
Submitted by grigby1 on Mon, 01/21/2019 - 12:27pm
LSH
turning point alignment method
Turning
time-stretch resistance
time-stretch
state-of-the-art methods
state-of-the-art audio retrieval method
Sampling and Counting Method
retrieval performance
Resists
Resistance
Resiliency
pubcrawl
Philips-like fingerprints
noise distortions
massive audio dataset
Acoustic Fingerprints
information retrieval
Indexes
ideal audio retrieval method
Human behavior
Fingerprint recognition
fingerprint matching
Filtering
distortion
composability
audio track
audio signal processing
audio retrieval
audio fingerprint
Acoustic signal processing
biblio
Securing Augmented Reality Output
Submitted by grigby1 on Mon, 11/19/2018 - 12:14pm
policy framework
virtual content
security of data
security
Scalability
Resists
Resiliency
resilience
pubcrawl
Prototypes
privacy
AR technologies
input privacy risks
Industries
Human behavior
data privacy
Automotive engineering
automotive components
automobiles
augmented reality output security
augmented reality
Arya
biblio
Mutual Authentication Protocol for RFID Based on ECC
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
Public key
tracking attacks
telecommunication security
system internal attack
Servers
security scalability
security protocol
Scalability
RFID systems
Resists
Resiliency
radiofrequency identification
radio frequency identification
authentication
pubcrawl
Protocols
mutual authentication protocol
mutual authentication
Metrics
Internet of things security and privacy
forward security
Elliptic curve cryptography
ECC
Denial of Service attacks
Cryptographic Protocols
camouflage attacks
biblio
LADP: A lightweight authentication and delegation protocol for RFID tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
protocol
telecommunication security
Supply Chain
RFID tags
RFID security
RFID privacy
RFID
Resists
radiofrequency identification
PUF-enabled tags
pubcrawl170112
Protocols
authentication
privacy
physically unclonable function
ownership transfer process
owner privacy protection
lightweight authentication-and-delegation protocol
LADP
delegation
data privacy
Cryptographic Protocols
computation cost reduction
communication cost reduction
biblio
A New Code Obfuscation Scheme for Software Protection
Submitted by BrandonB on Fri, 05/01/2015 - 7:57am
malicious reverse engineering
tampering
systems re-engineering
software protection
software engineering
Software
security attacks
reverse engineering
Resists
Resistance
nontrivial code clones
Cloning
Licenses
IT industry
Data processing
Computer crime
Complexity theory
code transformation
code patterns
code obfuscation scheme
code fragment cloning
« first
‹ previous
1
2
3
4
5
6
7