Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
business models
biblio
Best of Both Worlds: Integration of Split Manufacturing and Camouflaging into a Security-Driven CAD Flow for 3D ICs
Submitted by grigby1 on Thu, 07/30/2020 - 2:06pm
pubcrawl
Layout
layout camouflaging
LC
malicious entities
manufacturing
manufacturing flow
manufacturing paradigm
Metrics
production engineering computing
ip protection
resilience
reverse engineering
security
security-driven CAD flow
SM
split manufacturing
supply chains
Three-dimensional displays
extensive security analysis
policy-based governance
composability
IP piracy
3D ICs
business models
CAD
Cryptography
DRC-clean layouts
Resiliency
Foundries
Human behavior
Human Factors
industrial property
integrated circuit design
integrated circuit manufacture
integrated circuits
IP networks
biblio
Facing parallel market and counterfeit issues by the combined use of blockchain and CP-ABE encryption technologies
Submitted by grigby1 on Fri, 07/24/2020 - 12:41pm
distributed fashion
value propositions
user experience
Small & Medium Enterprises
Scalability
pubcrawl
provision trusted information
product tagging solution
product tagging
policy-based governance
parallel market
financial data processing
ethereum
DLT
blockchain
Distributed databases
cryptocurrency purposes
cryptocurrencies
CP-ABE encryption technique
CP-ABE
counterfeit products
counterfeit issues
collaboration
business models
brand protection
brand
blockchains
biblio
Identity management and trusted interaction in internet and mobile computing
Submitted by BrandonB on Wed, 05/06/2015 - 1:18pm
business models
Computer crime
Identity management
internet
Investment
marketing data processing
mobile computing
mobile services
online markets
online services
potent access capability
security
security of data
sustainable development
Trusted Computing
trusted interaction