Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded devices
biblio
A Security Integrated Attestation Scheme for Embedded Devices
Submitted by aekwall on Tue, 01/25/2022 - 3:49pm
performance evaluation
Time measurement
Swarm Intelligence
swarm attestation
security
Resiliency
reputation mechanism
Remote Attestation
pubcrawl
attestation
IoT security
Internet of Things
Human behavior
energy measurement
energy consumption
embedded devices
Conferences
composability
biblio
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
microprocessor chips
RSA-OAEP encryption scheme
RSA-OAEP cryptosystem
Rivest-Shamir-Adleman (RSA)
Raspbian OS
Raspbian
Raspberry Pi setup
Raspberry Pi
Rabin-P encryption scheme
Rabin-p cryptosystem
Rabin-p
public key cryptography
pubcrawl
Optimal Asymmetric Encryption Padding (OAEP)
microprocessor platform
exponentiation
Metrics
Linux operating system
Linux
Internet of Things structure
Internet of Things
Human behavior
energy consumption
encryption
embedded devices
decryption process
composability
Asymmetric Encryption
Scalability
Resiliency
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 12:25pm
secure platform
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
machine learning
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
drones
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
authorisation
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
wireless sensor networks
technological vision
industrial IoT applications
fABElous
ciphertext-policy attribute-based encryption
broadcast
attribute-based scheme
ABE techniques
ABE scheme
CP-ABE
communication overhead
actuators
Constrained Devices
Intelligent sensors
Scalability
policy-based governance
pubcrawl
Human behavior
embedded devices
data integrity
Internet of Things
attribute-based encryption
abe
encryption
data confidentiality
Cryptography
authorisation
Access Control
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
Fault detection method
smaller keys
Scalability
Resiliency
resilience
public key cryptosystems
public key cryptography
pubcrawl
power consumption
Montgomery Scalar Multiplication algorithm
Montgomery ladder
Metrics
key sizes
Hardware
fault injection attack
fault diagnosis
Circuit faults
fault detection
Fault Attacks
embedded devices
Elliptical Curve Cryptography
Elliptic curves
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
efficient fault detection method
efficient countermeasure
ECC
cryptographic computation
Conferences
classical asymmetric cryptosystems
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 10:58am
man-in-the-middle
weak point
update package encryption process
update
target hardware
symmetric encryption algorithms
symmetric encryption
specific encryption algorithms
secure update process
secure firmware update
safety critical operations
potential attackers
man-in-the-middle attacks
great numbers
asymmetric encryption algorithms
Asymmetric Encryption
security
Hash functions
intellectual property
confidentiality
authenticity
Embedded System
firmware
Metrics
composability
pubcrawl
Resiliency
embedded devices
embedded systems
telecommunication security
Cryptography
biblio
A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications
Submitted by aekwall on Mon, 02/10/2020 - 12:03pm
smart cards
session key disclosure attacks
secure multifactor remote user authentication scheme
secure multifactor authentication protocol
resource limited devices
Kalra's scheme
communication technology
cloud-IoT environment
cloud-IoT applications
biometrics (access control)
multifactor authentication
Human Factors
security problems
Cloud Computing
password
authentication
Metrics
pubcrawl
Resiliency
embedded devices
Protocols
Cryptographic Protocols
telecommunication security
Internet of Things
Big Data
authorisation
biblio
A Security Architecture for RISC-V based IoT Devices
Submitted by aekwall on Mon, 02/10/2020 - 11:43am
small and medium-sized enterprises
RISC-V
RISC-V based IoT devices
RISC-V ISA
Scalability
scalable computing subsystem
Scalable Security
Secure Boot
secure deployment
security architecture
security concept
SIP
Resiliency
small-to-medium enterprises
SME
Software
strict power constraints
system-in-package
system-on-chip
three dimensional system-in-package
Universal Sensor Platform SoC
USeP SoC
watchdog timer
Internet of Things
authenticated watchdog timer
automation
composability
core security features
Cryptography
customizable Internet of Things platform
Device Security
embedded devices
Fraunhofer Institutes
Hardware
3D-SiP
IoT
IoT applications
IoT market
medium security level
Microelectronics Security
Monitoring
p
Predictive Metrics
pubcrawl
reduced instruction set computing
biblio
Facial-based Intrusion Detection System with Deep Learning in Embedded Devices
Submitted by aekwall on Mon, 12/30/2019 - 12:12pm
Resiliency
Human behavior
pubcrawl
Metrics
Intrusion Detection
deep learning
convolutional neural network
embedded devices
facial recognition
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 10:52am
random access
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
medium access control layer
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
Device Language Message Specification-Companion Specification
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
access protocols
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model
1
2
next ›
last »