Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data encryption
biblio
Test methodology for detecting short-channel faults in network on- chip networks using IOT
Submitted by grigby1 on Fri, 05/15/2020 - 12:44pm
integrated circuit reliability
short-channel fault detection
Routing
routers networks
Power demand
NoC
network-on-chip analysis machine
network-on-chip
network routing
network on- chip networks
network on chip
Monitoring
IoT
Internet of Things
interconnection networks
integrated circuit testing
network on chip security
Integrated circuit interconnections
fault diagnosis
Encoders/decoders
Data Security
Data protection
data encryption
Cryptography
Conferences
computing-intensive data processing
computer architecture
Aerospace electronics
Metrics
Resiliency
resilience
Scalability
biblio
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function
Submitted by grigby1 on Wed, 03/18/2020 - 12:27pm
data encryption
Data Security
end-to-end data security
NIST statistical test suite
SDEx method
secure communication
secure data exchange method
secure transmission
pubcrawl
Resiliency
resilience
Secure File Sharing
biblio
From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
security assurance strategy
Identification
Information systems
information technology
intrusion prevention
network security technology
Organizations
Predictive Metrics
pubcrawl
security
Human behavior
security audit
Security Audits
security category
security principles
security technology evolution
Standards organizations
System recovery
system virtualization
big data security technologies
Intelligent Data Security
Compositionality
Resiliency
Scalability
Access Control
authentication
authorisation
Big Data
big data era
Intelligent Data and Security
Communication networks
computer network security
Cryptography
data encryption
data privacy
disaster recovery
DT security principles
encryption audits
biblio
A Novel Approach on Mobile Devices Fast Authentication and Key Agreement
Submitted by aekwall on Mon, 01/13/2020 - 12:07pm
key agreement
acoustic coupling
virtual key assention
mobile device authentication
GeneWave
gadget verification
gadget inspection
Device-to-device communication
device authentication
cell phones
Acoustics
acoustic communication
encoding
security
message authentication
authentication
Databases
pubcrawl
Human behavior
Resiliency
mobile computing
data encryption
Internet of Things
Cryptography
Scalability
biblio
ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
secure scheme
Outsourced Database
outsourcing
privacy
privacy concerns
pubcrawl
query processing
query results
result integrity
scalable scheme
one-dimensional query
secure tree index
Servers
SQL
SQL queries
sublinear query time
tree data structures
verifiability
verifiable range queries
database management systems
Metrics
composability
Resiliency
cloud adoption
Cryptography
data encryption
data outsourcing
data privacy
Outsourced Database Integrity
efficiency
efficient range queries
encrypted data
formal security analysis
Indexes
Multi-dimensional range query
multidimensional data records
multidimensional range query
biblio
Key Generation and Distribution Using Phase Fluctuation in Classical Fiber Channel
Submitted by grigby1 on Tue, 10/08/2019 - 4:44pm
reconfigurable polarization-maintaining fiber lengths
optical phase fluctuations
optical receivers
optical transmitters
orthogonal polarization modes
orthogonal polarization modes (OPMs)
output signal extraction
pubcrawl
random key generation
random phase fluctuation
optical fibre polarisation
resilience
Resiliency
Scalability
secure key distribution scheme
secure key generation scheme
standard single-mode fiber
telecommunication security
two-legal receiver
two-legal transmitter
light interferometers
classical optical fiber channel
Cryptography
data encryption
Delay interferometer
Delay interferometer (DI)
DI
Fluctuations
Human behavior
key distribution.
classical fiber channel
Metrics
optical amplifiers
Optical fiber amplifiers
Optical fiber dispersion
Optical fiber networks
Optical fiber polarization
optical fibre amplifiers
optical fibre dispersion
optical fibre networks
biblio
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
mobile data collectors
composability
pubcrawl
Human behavior
Resiliency
whitebox cryptography
tampered drones
Table lookup
software-based attestation
software integrity
software attestation
secure communications
secret key protection
privacy-sensitive data
security of data
malicious physical/cyber attacks
group attestation scheme
drones
data repositories
data memory
data encryption
code attestation technique
malware
attestation
secret keys
private key cryptography
data privacy
encryption
biblio
Design and implementation of HDFS data encryption scheme using ARIA algorithm on Hadoop
Submitted by grigby1 on Fri, 09/28/2018 - 4:21pm
k-means
encryption
Hadoop distributed computing
Hadoop Encryption Codec
Hadoop Security
HDFS block-splitting component
HDFS Data Encryption
HDFS data encryption scheme
hierarchical clustering
efficient encryption
Korean government
pubcrawl
resilience
Resiliency
Sorting
standards
variable-length data processing
word counting
Cryptography
AES international standard data encryption algorithm
Algorithm design and analysis
ARIA algorithm
ARIA Encryption Algorithm
ARIA/AES encryption
Big Data
Codecs
composability
AES algorithms
cyber physical systems
data block
data encryption
Data processing
distributed data processing platform
Distributed databases
domestic usages
biblio
Security issues in controller area networks in automobiles
Submitted by grigby1 on Wed, 09/05/2018 - 10:55am
instrument cluster
controller area networks
BMW E90 instrument cluster
CAN (Controller Area Network)
CAN protocol
CAN-bus
ECU
ECU (Electronic Control Unit)
electronic control units
controller area network
modern automobiles
modern car hacking
modern vehicles
render vehicles
Rogue device
spoofed messages
controller area network security
data encryption
pubcrawl
Resiliency
performance evaluation
Cryptography
Protocols
security of data
authentication
Safety
security
automobiles
traffic engineering computing
security issues
resilience
Instruments
Automotive engineering
automotive electronics
biblio
Towards Scalable and Dynamic Data Encryption for Multi-tenant SaaS
Submitted by grigby1 on Mon, 06/11/2018 - 3:46pm
resilience
pubcrawl
composability
data encryption
Resiliency
Policy
collaboration
policy-based governance
cloud data storage
multi-tenant SaaS
NoSQL
Secure data management
untrusted clouds
middleware security
« first
‹ previous
1
2
3
4
5
next ›
last »