Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Radiation detectors
biblio
Detecting untestable hardware Trojan with non-intrusive concurrent on line testing
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
manufacturing testing
untestable hardware trojan
Trojan horses
security
Radiation detectors
pubcrawl170112
nonintrusive concurrent on line testing
Monitoring
microprocessor chips
built-in self-test
manufacturing stage
manufacturing cycle
integrated circuit testing
HT
Hardware
Europe
circuit geometrical characteristics
chip supply chain
biblio
The Design of Brand Cosmetics Anti-counterfeiting System Based on RFID Technology
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
RFID technology
nonsecurity phenomena
product logistics information tracing
product logistics information tracking
production engineering computing
pubcrawl170112
Radiation detectors
radiofrequency identification
RFID (Radio Frequency Identification) technology
luxury cosmetics brand
sales methods
security
supply chain channels
supply chain management
supply chains
system-EPC system
visual information management system
analysis and design
information management
hard security phenomena
gray goods
false security phenomena
fake goods
distributed RFID tracking
digital authentication security technology
Databases
counterfeit goods
cosmetics brand distribution channels
cosmetics
cosmetic
brand cosmetics anticounterfeiting system
authentication
anticounterfeiting security system
biblio
Phishing - the threat that still exists
Submitted by grigby1 on Tue, 03/07/2017 - 1:41pm
online security attack
Uniform resource locators
statistical analysis
sensitive information harvesting
Radiation detectors
pubcrawl170109
phishing attack
Phishing
Password theft
online security threat
antiphishing systems
Google
Electronic mail
cyber security
Computer hacking
Computer Fraud
Computer crime
Browsers
authorisation
biblio
"A Logic of Programs with Interface-Confined Code"
Submitted by grigby1 on Thu, 02/23/2017 - 2:27pm
safety properties
Web browsers
untrusted code
trusted computing system
Trusted Computing
System M program logic
step-indexed model
standards
source code (software)
Semantics
security-critical systems
sandbox
adversary-supplied code
Safety
Radiation detectors
pubcrawl170106
program logic
Memoir design
interface-confined code
interface confinement
Instruction sets
hypervisors
Computational modeling
cognition
biblio
"Auto-synchronized selective encryption of video contents for an improved transmission robustness over error-prone channels"
Submitted by grigby1 on Mon, 02/13/2017 - 2:09pm
Radiation detectors
video transmission robustness
video content autosynchronized selective encryption
video coding
video codecs
Synchronization
standards
Selective Encryption
RTP session
RTP
Robustness
real-time diffusion scenario
advanced encryption standard
pubcrawl170102
optimization
HEVC
H.264
error-prone channels
encryption
decryption
Cryptography
broadcast
AES-CTR
biblio
Time-based OTP authentication via secure tunnel (TOAST): A mobile TOTP scheme using TLS seed exchange and encrypted offline keystore
Submitted by BrandonB on Tue, 05/05/2015 - 9:01am
password-protected keystore
Web protocols
Transport Layer Security
TOTP algorithm
TOAST scheme
TLS seed exchange
time-based OTP authentication
strong key derivation function
software-based token
Servers
security requirements
secure tunnel
Radiation detectors
PBEWithSHAANDTwofish-CBC function
authentication
one-time password
multifactor authentication cryptosystem
multifactor authentication
mobile TOTP scheme
Mobile communication
IETF RFC 6239 standard
Google
encrypted offline keystore
cryptosystems development
Cryptography
cryptographic standards
BC UBER keystore
authorisation
biblio
Countering anti-forensics of median filtering
Submitted by BrandonB on Mon, 05/04/2015 - 11:30am
image pixel difference distribution restoration
statistical fingerprints
statistical analysis
Radiation detectors
pixel difference
Noise
median filters
median filtering traces
median filtering
image restoration
anti-forensic
Image forensics
Image coding
Forensics
Filtering
Discrete Fourier transforms
digital images
Detectors
antiforensics countering
antiforensic method
« first
‹ previous
1
2