Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded devices
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by aekwall on Mon, 11/04/2019 - 11:23am
Resiliency
multiprocessing systems
parallel database encryption system
parallel databases
Performance
performance evaluation
pubcrawl
RDBMS
relational database security
relational databases
Multicore processing
Scalability
smart phones
SQLite databases
SQLite RDBMS
SQLite-XTS
storage management
storage security
user sensitive data
XTS encryption
full disk encryption
composability
Cryptography
data confidentiality
Data protection
Databases
device processing resources
embedded devices
embedded systems
encryption
commodity multicore processors
handheld devices
Human behavior
light database encryption design
massive storage systems
Metrics
mobile computing
mobile devices
multicore CPU
multicore computing security
biblio
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
Submitted by aekwall on Wed, 05/01/2019 - 12:38pm
identity-based encryption schemes
Telecommunications
standards
smart meters
smart cards
Scalability
Resiliency
public key cryptography
pubcrawl
performance evaluation
pairing-based elliptic curve cryptography
Metrics
Bilinear Pairing
group signatures
embedded devices
Elliptic curves
Elliptic curve cryptography
digital signatures
Cryptography
Cryptographic Protocols
cryptographic libraries
Constrained Devices
bilinear pairing operation
biblio
Capacitive Multi-Channel Security Sensor IC for Tamper-Resistant Enclosures
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
CMOS integrated circuits
sensor security
time 19.7 ms
tamper-resistant enclosures
SNR
size 350.0 nm
sensor fusion
Semiconductor device measurement
physical interaction
physical attacks
noise figure 94.6 dB
integrated circuits
integrated circuit packaging
Electrodes
electrode matrix
CMOS technology
security
Capacitors
capacitive touch technology
capacitive sensors
capacitive multichannel security sensor IC
capacitance measurement
capacitance 460.0 aF
capacitance 35.0 aF
Capacitance
Metrics
composability
pubcrawl
Human behavior
Resiliency
embedded devices
biblio
ERASMUS: Efficient remote attestation via self-measurement for unattended settings
Submitted by aekwall on Wed, 02/13/2019 - 11:59am
Phase measurement
composability
pubcrawl
Human behavior
Resiliency
untrusted remote device
unattended devices
Time measurement
software state
safety-critical applications
real-time systems
real-time devices
Radio frequency
RA techniques
Quality-of-Attestation
potentially expensive computation
Internet of Things
on-demand operation
mobile malware
mobile computing
invasive software
ERASMUS
embedded devices
efficient remote attestation
concrete technique
software integrity
security
Remote Attestation
malware
attestation
IoT devices
biblio
Constant Time, Fixed Memory, Zero False Negative Error Logging for Low Power Wearable Devices
Submitted by grigby1 on Mon, 04/02/2018 - 12:56pm
traditional error logging algorithms
pubcrawl
Reliability
resilience
Resiliency
run-time error logging
Scalability
security
Sensor Systems
privacy
wearable computers
Wearable devices
Wearable sensors
wearables security
Wireless communication
wireless sensor networks
wireless wearable embedded devices
zero false negative error
false positive error rate
Caching Algorithm
Conferences
constant insertion time
constant memory
constant time
embedded devices
Error Logging
error logging algorithm
Body Sensors
firmware
firmware faults
fixed memory
hashing
Human behavior
Internet of Things
IoT systems
low power wearable devices
biblio
Multi-factor authentication using accelerometers for the Internet-of-Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
Metrics
sensor security
security of data
security harvesting
Resiliency
resilience
pubcrawl
Protocols
Pins
multifactor authentication
Multi-factor authentication
mobile devices
mobile computing
Accelerometers
IoT
Internet-of-Things
Internet of Things
Human Factors
human factor
Human behavior
Hardware
experimental embedded system
embedded systems
embedded devices
authentication
biblio
Securing user identity and transactions symbiotically: IoT meets blockchain
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
permissioned blockchain
user identity
transactions symbiotically
standards
security of data
security
Scalability
Robustness
Resiliency
Public key
pubcrawl
Protocols
privacy
Permissioned Blockchains
attribute management
performance evaluation
IoT
Internet of Things
Identity management
Human behavior
History
embedded devices
Distributed Identity Management
device identity
data privacy
Cryptography
blockchain technology
blockchain
biblio
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations
Submitted by grigby1 on Mon, 11/20/2017 - 12:04pm
Metrics
vulnerabilities
video surveillance systems
video surveillance
threats
survey
shodan
security
Resiliency
pubcrawl
novel covert channels
novel attacks
Mitigations
attacks
IPcam
IoT
Internet of Things
insecurity
insecam
Human Factors
Human behavior
embedded systems
embedded devices
defenses
covert channels
CCTV
biblio
DARPA: Device Attestation Resilient to Physical Attacks
Submitted by grigby1 on Wed, 03/29/2017 - 12:34pm
attestation
capture
collective attestation
embedded devices
Metrics
networks
neural network
Neural networks
neural networks security
physical attacks
policy-based governance
pubcrawl
Resiliency
biblio
Trusted Platform Module for Smart Cards
Submitted by BrandonB on Fri, 05/01/2015 - 9:09am
near-field communication
User Centric Tamper-Resistant Device
user centric smart card ownership model
UCTD
UCOM
trusted service manager
Trusted Platform Module
Trusted Execution Environment
TEE
smart cards
security
Runtime
privacy preservation platforms
off-card trusted relationship
application provider
near field communication-based mobile phone services
multiapplication smart card initiative
Mobile handsets
Mobile communication
Hardware
global platform consumer centric model
embedded devices
deployment model
data privacy
cross-device security
computer architecture
Computational modeling
« first
‹ previous
1
2