Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
authentication security
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 9:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication
biblio
Design of Boolean Chaotic Oscillator Using CMOS Technology for True Random Number Generation
Submitted by grigby1 on Thu, 05/24/2018 - 11:16am
random number generation
message authentication
Metrics
National Institute of Standards and Technology
NI ELVIS platform
Oscillators
pubcrawl
random cryptographic keys
random key generation
Logic gates
random number generators
random numbers
resilience
Resiliency
Ring oscillators
Scalability
security keys
45nm CMOS technology
Inverters
Human behavior
Generators
delays
data transmission security
Cryptography
CMOS integrated circuits
CMOS Boolean Chaotic Oscillator Design
CMOS
chaos
Capacitors
Cadence Virtuoso tool
cadence virtuoso
authentication security
application specific integrated circuits
profile
Michael Blicher
CPS Domains
Architectures
Embedded Software
Defense
Platforms
Control
Systems Engineering
Modeling
Manufacturing
Science of Security
Transportation
Validation and Verification
CPS Technologies
Foundations
Research Program Overview
DSRC
authentication security
Michigan
biblio
Towards Secure and Dependable Authentication and Authorization Infrastructures
Submitted by BrandonB on Mon, 05/04/2015 - 1:47pm
intrusion-tolerant replication
untrusted gateways
trusted components
software fault tolerance
Servers
security
resilience architecture
RADIUS
Public key
Protocols
OpenID
Logic gates
IT infrastructures
authentication
intrusion tolerance
fault-free executions
enterprise environments
diverse computing environments
dependability
authorization infrastructures
authorisation
authentication security
authentication infrastructures
authentication dependability
authentication and authorization services