Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
An object-oriented open software architecture for security applications
Submitted by grigby1 on Thu, 06/07/2018 - 3:01pm
public key cryptography
Universal Serial Bus
Software Architecture
Software
smart cards
security of data
security device
security applications
security APIs
security
secure messaging
secure communication
SEcube™ platform
Resiliency
resilience
application program interfaces
pubcrawl
Pins
Open Hardware security platform
object-oriented open software architecture
object oriented security
multiplatform Open Source security framework
Metrics
Libraries
Hardware
field programmable gate arrays
dedicated Open Hardware devices
Data protection
CPU
composability
biblio
On Secure Implementations of Quantum-Resistant Supersingular Isogeny Diffie-Hellman
Submitted by grigby1 on Wed, 05/30/2018 - 4:06pm
Scalability
pubcrawl
public key cryptography
quantum computing
quantum-resistant SIDH protocol
quantum-resistant supersingular isogeny Diffie-Hellman protocol
random number generation
resilience
Resiliency
Protocols
secret kernel point
secret scalars
side-channel analysis
signature based defense
simple power analysis
timing
timing attacks
true random number generator
Elliptic curves
Cryptographic Protocols
Cryptography
Differential Power Analysis
double-point multiplication
ECDH key exchange
Electronic mail
elliptic curve Diffie-Hellman key exchange
elliptic curve isomorphism
ALU
elliptic curve theory
Fault Attacks
Fermat little theorem inversion
Hardware
hardware architectures
isogeny-based cryptography
oracle attacks
Post-quantum cryptography
biblio
IPv6 Routing Protocol for Low-Power and Lossy Networks Implementation in Network Simulator \#x2014; 3
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Policy
wireless sensor networks
Topology
telecommunication power management
RPL multiple instances
RPL
Routing protocols
Routing
reliable communication
pubcrawl
protocol verification
privacy
policy-based collaboration
Compositionality
physical environments
NS3
ns-3 implementation
network simulator
maintenance engineering
lossy networks implementation
lossy environments
Linear programming
IPv6 Routing Protocol
IP networks
Hardware
efficient energy management system
biblio
Design, Verification and Implementation of a Lightweight Remote Attestation Protocol for Process Control Systems
Submitted by grigby1 on Thu, 05/24/2018 - 12:22pm
Remote Attestation
policy-based collaboration
privacy
process control
process control systems
program verification
protocol implementation
protocol verification
Protocols
pubcrawl
Policy
remote network infrastructures
Romania
Scyther model checking tool
secure software integrity verification scheme
security
Software
software integrity
specialized components
industrial applications
commodity-off-the-shelf hardware
commodity-off-the-shelf software
Compositionality
COTS
Cryptographic Protocols
data integrity
formal verification
gas transportation network automation
Hardware
closed process control applications
industrial communications
industrial control
isolated components
lightweight remote attestation protocol
Nickel
PCS
Phoenix-Contact industrial controller
physically secured locations
biblio
Design and Verification of a Novel IoT Node Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 12:21pm
Ports (Computers)
wireless sensor networks
Verilog
transport protocols
transport protocol
Switches
Servers
pubcrawl
Protocols
protocol verification
privacy
Compositionality
policy-based collaboration
Policy
Microprocessors
IoT node protocol verification
IoT
Internet of Things
intelligent features
Hardware
field programmable gate arrays
dynamic reconfigurable features
biblio
On the implications of plug-and-learn adaptive hardware components toward a cyberphysical systems perspective on evolvable and adaptive hardware
Submitted by el_wehby on Thu, 05/17/2018 - 6:52pm
evolving intramodule relationships extraction
plug-and-learn adaptive hardware components
Oscillators
model-checking
model checking
Legged locomotion
Learning systems
Hardware
formal verification
Adaptation models
evolvable and adaptive hardware
evolutionary computation
EAH systems
cyberphysical systems
cyber-physical systems
Atomic measurements
Antenna measurements
1239196
biblio
The Technology of the Gaps: An Evolvable Hardware Synthesized Oscillator for the Control of a Flapping-Wing Micro Air Vehicle
Submitted by el_wehby on Thu, 05/17/2018 - 6:51pm
Force
vehicles
Presses
Oscillators
mobile robots
microrobots
Hardware
FWMAV project
frequency control
aerospace control
flapping-wing micro air vehicle control
evolvable hardware synthesized oscillator
evolvable and adaptive hardware
evolutionary computation
EAH design integration principles
drop-in replacements
Digital circuits
aircraft control
1239196
biblio
A data remanence based approach to generate 100% stable keys from an SRAM physical unclonable function
Submitted by grigby1 on Wed, 05/16/2018 - 1:49pm
random noise
word length 256 bit
TMV scheme
Thermal stability
temporal majority voting
stable keys
stable key generation
SRAM chips
SRAM cells
SRAM cell
SRAM based key generation
SRAM
Resiliency
resilience
remanence
reliable key generation
arrays
pubcrawl
power ramp up times
Physical Unclonable Function
memory size 512 KByte
inherent process mismatch
Hardware
encryption keys
device aging
data remanence based approach
data remanence
Cryptography
Compositionality
Circuit stability
bit masking
biblio
A light-weight hardware/software co-design for pairing-based cryptography with low power and energy consumption
Submitted by grigby1 on Wed, 05/16/2018 - 1:47pm
public key cryptography
Metrics
Montgomery multiplier
multiplying circuits
open-source software PBC implementation
optimal Ate pairing
Pairing based cryptography
pairing-based cryptography
PKC
Power measurement
pubcrawl
low-power electronics
public-key cryptography
Repudiation
resilience
Resiliency
sensors
simple power analysis
Software
system-on-chip
Zynq-7020 SoC
embedded electronic devices
Barreto-Naehrig curves
circuit optimisation
Clocks
composability
cryptographic services
cryptographic system
Cryptography
Differential Power Analysis
ECC
embedded
ARM Cortex A9 processor
energy consumption
field programmable gate arrays
Hardware
hardware-software co-design
hardware-software codesign
Human behavior
human factor
light-weight hardware/software co-design
lightweight devices
biblio
Synthesis of Hardware Sandboxes for Trojan Mitigation in Systems on Chip
Submitted by grigby1 on Wed, 05/09/2018 - 2:54pm
security
nontrusted IP
Policy
Policy-Governed Secure Collaboration
Policy-Governed systems
property specification language SERE
pubcrawl
run-time verification techniques
sandboxed layouts
sandboxing
IP security
sequential extended regular expressions
SoC
system-on-chip
Trojan horses
Trojan mitigation
trusted system-on-chips
virtualized controllers
virtualized resources
composability
automata theory
automatic generation
behavioral checkers
behavioral properties
CAPSL
collaboration
component authentication process
components off the shelf
automata
computer science
Computers
COTS
design flow
Hardware
hardware sandboxes
interface automata
invasive software
« first
‹ previous
…
47
48
49
50
51
52
53
54
55
…
next ›
last »