Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security protocols
biblio
Vertical Composition and Sound Payload Abstraction for Stateful Protocols
Submitted by grigby1 on Thu, 02/24/2022 - 11:29am
Protocols
vertical composition
tools
Syntactics
stateful protocols
standards
security protocols
pubcrawl
protocol verification
collaboration
privacy
policy-based collaboration
Payloads
formal methods and verification
Cryptography
computer security
Compositionality
composability
biblio
An Interactive Prover for Protocol Verification in the Computational Model
Submitted by grigby1 on Thu, 02/24/2022 - 11:29am
policy-based collaboration
tools
Solids
Semantics
security protocols
pubcrawl
protocol verification
Protocols
privacy
cognition
observational equivalence
Interactive Prover
formal methods
computational security
Computational modeling
Compositionality
composability
collaboration
biblio
Tamarin software – the tool for protocols verification security
Submitted by aekwall on Tue, 10/12/2021 - 2:06pm
Software
privacy
Internet of Things
Protocols
tools
encryption
pubcrawl
composability
standards
Compositionality
Safety
policy-based governance
security protocols
sensor networks
Tamarin software
protocol verification
biblio
LOKI: A Lightweight Cryptographic Key Distribution Protocol for Controller Area Networks
Submitted by aekwall on Tue, 09/07/2021 - 10:13am
Cryptography
sensors
Hardware
Software
Servers
authentication
Protocols
pubcrawl
Resiliency
Internet of Things
key management
controller area networks.
security protocols
controller area network security
cyber-physical systems
biblio
Automated Analysis of PUF-based Protocols
Submitted by grigby1 on Wed, 01/20/2021 - 3:21pm
integrated circuit
Tamarin prover
security protocols
Security Properties
Resiliency
resilience
pufs
PUF-based protocols
PUF API
pubcrawl
Protocols
physical unclonable functions
mutual authentication protocol
integrated circuits
Analytical models
hardware-based security
Hardware
formal methods and verification
fingerprint identification
error correction data
Data models
Cryptography
Cryptographic Protocols
Compositionality
application programming interface
APIs
API
biblio
Secure Information Exchange in Defining the Location of the Vehicle
Submitted by grigby1 on Mon, 11/02/2020 - 11:10am
location determination
Wireless fidelity
Vehicular Communication
telecommunication security
smart roads
security protocols
security
Roads
Resiliency
resilience
radionavigation
pubcrawl
Protocols
Metrics
automobiles
locating
Internet of Vehicles
information security
information exchange
Human Factors
Global Positioning System
Electric Vehicles
electric vehicle market
effective secure communication protocol
car control system
Base stations
base station
biblio
Physical Unclonable Function-Based Key Sharing via Machine Learning for IoT Security
Submitted by grigby1 on Fri, 10/30/2020 - 11:15am
Protocols
lightweight security primitive
lookup table
LUT
machine learning
machine learning (ML)
one-to-one input-output mapping
Physical Unclonable Function
physical unclonable function (PUF)
physical unclonable function-based key sharing
private key cryptography
lightweight key sharing protocols
pubcrawl
PUF-based key sharing method
resource-constrained devices
Ring Oscillator
Scalability
security
security protocols
shared key
silicon physical unclonable function
Table lookup
I-O Systems
battery power
chip fabrication process
chip-unique key
computer network security
copy protection
crossover RO PUF
Cryptographic Protocols
Cryptography
delays
device authentication
authentication
i-o systems security
industry Internet of Things
Internet of Things
interstage crossing structure
Inverters
IoT security
key generation
Key-sharing
learning (artificial intelligence)
biblio
Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units
Submitted by aekwall on Mon, 07/20/2020 - 9:42am
Intelligent Transportation Systems
Vehicular security
Plugs
low cost CAN probe
electronic control units
defined analysis tools
controller area networks
car generation
CAN bus attacks
Brakes
autonomous vehicles
automotive control area network bus
attack scenarios
connected vehicles
automobiles
automotive electronics
controller area network security
Payloads
Engines
Probes
security protocols
pubcrawl
Resiliency
cyber-physical systems
Cryptographic Protocols
security
Internet of Things
biblio
Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things
Submitted by grigby1 on Fri, 06/26/2020 - 11:55am
Internet of Things
Transportation
security protocols
Scalability
Resiliency
resilience
Public-Key Cryptosystems (PKC)
public-key cryptosystems
public key cryptography
pubcrawl
privacy and security
Metrics
Medical services
lightweight devices
IoT devices
Internet of Things (IoT)
computer architecture
indoor localization
healthcare facilities
health care
Hardware/Software Co-Design
hardware-software codesign
hardware-software co-design
Hardware
energy consumption
Elliptic-Curve Cryptography (ECC)
elliptic-curve cryptography
Elliptic curve cryptography
ECC
Cryptography
Cryptographic Protocols
biblio
Experience Report: How to Extract Security Protocols' Specifications from C Libraries
Submitted by grigby1 on Fri, 04/24/2020 - 3:20pm
object-oriented languages
tools
Task Analysis
Software
security protocols
security protocol specifications
security of data
security
reverse engineering
Resiliency
resilience
pubcrawl
Protocols
object-oriented programming
automatic tools
object oriented security
Metrics
Libraries
human-dependent approach
formal verification
Formal Specification
formal model
extract security protocols
documentation
composability
codelevel reverse engineering
C programming language
C libraries
1
2
3
next ›
last »