Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things (IoT)
biblio
Energy-Adaptive Lightweight Hardware Security Module using Partial Dynamic Reconfiguration for Energy Limited Internet of Things Applications
Submitted by grigby1 on Fri, 06/26/2020 - 1:17pm
multiple encryption modes
energy limited internet of things applications
energy-adaptive lightweight hardware security module
high power consumption
high security levels
Internet of Things (IoT)
low power consumption
low power IoT applications
low security level
maximum dynamic power dissipation
Encryption Modes
partial dynamic reconfiguration
power 10.08 mW
power budget
power constraint
power-security level trade-off
security level values
security strength
Throughput
composability
Cryptography
encryption
Internet of Things
security
security attacks
Hardware
Data Security
pubcrawl
Ciphers
Metrics
Resiliency
cyber-physical systems
Applicability and Robustness (CAESAR)
Competition for Authenticated Encryption: Security
DPR system
dynamic partial reconfiguration
Dynamic Partial Reconfiguration (DPR)
biblio
Efficient Hardware/Software Co-Design of Elliptic-Curve Cryptography for the Internet of Things
Submitted by grigby1 on Fri, 06/26/2020 - 12:55pm
Internet of Things
Transportation
security protocols
Scalability
Resiliency
resilience
Public-Key Cryptosystems (PKC)
public-key cryptosystems
public key cryptography
pubcrawl
privacy and security
Metrics
Medical services
lightweight devices
IoT devices
Internet of Things (IoT)
computer architecture
indoor localization
healthcare facilities
health care
Hardware/Software Co-Design
hardware-software codesign
hardware-software co-design
Hardware
energy consumption
Elliptic-Curve Cryptography (ECC)
elliptic-curve cryptography
Elliptic curve cryptography
ECC
Cryptography
Cryptographic Protocols
biblio
Agent Based Fog Architecture using NDN and Trust Management for IoT
Submitted by grigby1 on Fri, 05/29/2020 - 3:53pm
robust system
IoT generation
multi-agent systems
Named Data Network Security
Named Data Network(NDN)
NDN
present-day network infrastructure
pubcrawl
resilience
Resiliency
IoT devices
Scalability
secured named data network protocol
secured system
security
Servers
service-oriented architecture
traffic usage reduction
Trust management
drastic rate
agent based composition model
agent society
caching layer
Cloud Computing
Computational modeling
computer architecture
computer network security
Data models
Agent Based Communication
edge computing
fog architecture
fog based agent model
Fog computing
fog layer
Human behavior
Internet of Things
Internet of Things (IoT)
biblio
Enhance Wireless Security System Using Butterfly Network Coding Algorithm
Submitted by aekwall on Mon, 04/06/2020 - 9:56am
IoT system
wireless sensing network
wireless security system
Wi-Fi module
traditional security system
system indicators
Received signal strength indication (RSSI)
received signal strength indication
network transmission
Network node routing
butterfly network coding algorithm
Butterfly network coding (BNC) algorithm
cyber physical systems
telecommunication security
encoding
network coding
Predictive Metrics
security monitoring
wireless LAN
Decoding
RSSI
wireless sensor networks
composability
pubcrawl
Resiliency
Internet of Things (IoT)
biblio
Realizing Multi-Access Edge Computing Feasibility: Security Perspective
Submitted by aekwall on Mon, 03/02/2020 - 12:30pm
multiaccess edge computing feasibility
cloud computing capabilities
communication devices
efficient data processing architecture
ETSI standards
gigabit-level bandwidth
IoT services
MEC
mobile service platform
Multi-Access Edge Computing (MEC)
security challenges
Radio Access Network
RAN
security perspective
threat vectors
typical MEC deployment scenario
ultra-high storage capacity
ultra-low latency
virtualization technologies
Ubiquitous Computing Security
5G mobile communication
Scalability
virtualisation
Internet of Things
telecommunication security
security
Internet of Things (IoT)
Resiliency
pubcrawl
Metrics
Cloud Computing
radio access networks
telecommunication computing
mobile network
Ambient intelligence
multi-access systems
Human Factors
ubiquitous computing
5G
biblio
A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal
Submitted by grigby1 on Wed, 02/26/2020 - 4:34pm
Scalability
Mobile Ad-hoc Network host
mobile radio
packet count
privacy
Protocols
pubcrawl
Resiliency
route detection
route discovery
Routing
Routing protocols
Mobile Ad-Hoc Network (MANET)
Secure Autonomic Mobile Ad-hoc Network
telecommunication network routing
trust administration approach
Trust estimation dependent
trust management approach
trust organization approaches
Trust Routing
trusted path
trusted Routing proposal
wireless sensor networks
Informatics
Adaptive Information Dissemination (AID)
attacker
composability
Compositionality
data privacy
Data Transmission
different occurrences ease
direction-finding procedure
fuzzy trust approach
hybrid approach
inaccessible systems
Adaptive Information Dissemination
information dissemination
internet
Internet of Things
Internet of Things (IoT)
Internet of Things gadgets
IoT
MANET Attack Detection
manet privacy
Metrics
mobile ad hoc networks
biblio
IoT Architecture for Smart Grids
Submitted by aekwall on Mon, 02/10/2020 - 12:06pm
IoT architecture
active distribution networks
Communications technology
congestion management
distribution level
energy storage facilities
industrial sector
information and communications technology
Internet of energy (IoE)
Internet of Things (IoT)
Compositionality
IoT-based technologies
modern communicational platforms
Renewable Energy Resources
smart buildings
Smart grid 2.0
thermal generation
wind energy
Smart Grid Sensors
distributed power generation
embedded systems
real-time systems
Resiliency
pubcrawl
internet
Smart Grids
smart power grids
power engineering computing
Internet of Things
renewable energy
sensors
Human Factors
Energy storage
Microgrids
Wind farms
wind turbines
smart cities
biblio
CDTA: A Comprehensive Solution for Counterfeit Detection, Traceability, and Authentication in the IoT Supply Chain
Submitted by grigby1 on Mon, 01/27/2020 - 12:35pm
policy-based governance
Traceability
supply chain security
supply chain risk assessment
Scalability
Resiliency
resilience
radio-frequency identification (RFID)
pubcrawl
authentication
Metrics
Internet of Things (IoT)
Human Factors
Human behavior
counterfeit detection
composability
collaboration
biblio
IoT-Based "All-Round 3D Technology Security Circle" in New Taipei City Police Department
Submitted by grigby1 on Tue, 01/21/2020 - 11:58am
Compositionality
design thinking
expandability
Human-centered design (HCD)
Internet of Things (IoT)
New Taipei City Police Department
pubcrawl
resilience
Resiliency
biblio
Security Embedded Offloading Requirements for IoT-Fog Paradigm
Submitted by aekwall on Mon, 01/20/2020 - 11:53am
IoT-Fog based systems
Task Offloading
security provision
security embedded task offloading requirements
security embedded offloading requirements
Scalability
resource allocation
Resiliency
pubcrawl
propagation latencies
offloading security
middleware technologies
middleware
Middle-ware
IoT-Fog paradigm
Cloud Computing
IoT-Fog based future communication networks
Internet of Things (IoT)
Internet of Things
internet
information processing
future smart networks
Fog Computing and Security
Fog computing
embedded security requirements
edge computing
delay tolerant networks
Data protection
data management
computer network security
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »