Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid
Submitted by grigby1 on Wed, 02/21/2018 - 1:47pm
Ransomware
Metrics
Mobile communication
mobile computing
mobile devices
Mobile handsets
mobile ransomware
performance evaluation
pubcrawl
RANSOMSAFEDROID prototype
malware
resilience
Resiliency
Scalability
secure local persistent partition
sensitive data
software performance evaluation
storage management
Trusted Computing
TrustZone based backup service
data recovery
android encryption
Android ransomware dissemination
Androids
ARM TrustZone extension
back-up procedures
backup tools
Cryptography
data encryption
Data protection
Android (operating system)
device filesystem
Hardware
Human behavior
Human Factors
Humanoid robots
i.MX53 development board
incremental backups
invasive software
biblio
Security of hardware architecture, design and performance of low drop-out voltage regulator LDO to protect power mobile applications
Submitted by grigby1 on Wed, 02/21/2018 - 1:43pm
CMOS low-power
Hardware
integrated circuit
LDO
Low power SOC
Mathematical model
Network Security Architecture
Power transistors
pubcrawl
Regulators
resilience
Resiliency
security
Voltage control
wireless sensor networks
WSNs
biblio
The undetectable clock cycle sensitive hardware trojan
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
Hardware
Trusted design
Trojan horses
trees (mathematics)
Resiliency
resilience
redundant circuits
pubcrawl
Microelectronic Security
Metrics
invasive software
HT
Hardware Trojans
Circuit faults
FSM
finite state machines
finite state machine
embedded systems
embedded clock-cycle-sensitive hardware trojans
delays
Cryptography chips
Cryptography
critical path
composability
Clocks
clock tree structure
biblio
Hardware malicious circuit identification using self referencing approach
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
post-silicon testing
Trojan horses
testing
Test vector generation
Temporal Self Referencing
side channel analysis
sequential Trojans
Sequential trojan
self referencing approach
security vulnerabilities
Robust Trojans
Resiliency
resilience
pubcrawl
Power measurement
composability
Payloads
outsourced products
Microelectronic Security
Metrics
malicious inclusions
logic testing
leakage power
invasive software
hardware Trojan detection sensitivity
hardware malicious circuit identification
Hardware
delays
Cryptography
biblio
Side-channel collision attack based on multiple-bits
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
AES
Algorithm design and analysis
collision attack
composability
encryption
Euclidean distance
field programmable gate arrays
Hardware
Metrics
Microelectronic Security
pubcrawl
resilience
Resiliency
Side-channel attack
side-channel attacks
biblio
Reliability, availability and security of computer systems supported by RFID technology
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
quantitative indicators
software reliability
Software
security of data
security
RFID technology
Resiliency
resilience
Reliability
radiofrequency identification
composability
pubcrawl
Microelectronic Security
Metrics
Hardware
Computers
computer systems security
computer systems reliability
computer systems availability
computer system quality
biblio
Acceleration of RSA processes based on hybrid ARM-FPGA cluster
Submitted by grigby1 on Wed, 02/21/2018 - 1:38pm
resilience
MPI
Multicore Computing
multicore computing security
multicore desktop
multiprocessing systems
node-to-node communication
none-subtraction Montgomery algorithm
Program processors
pubcrawl
public key cryptography
microprocessor chips
Resiliency
RSA
RSA algorithm
RSA processes acceleration
Scalability
software-hardware cooperation
system-on-chip
Xilinx Zynq SoC
Zynq
FPGA fabric
Algorithm design and analysis
ARM CPU
Chinese remainder theorem
cluster
cluster infrastructure
Clustering algorithms
computer architecture
CRT
field programmable gate arrays
Acceleration
Hardware
Heterogeneous
hybrid architectures
hybrid ARM-FPGA cluster
Intel i7-3770
many-core server
message passing
message passing interface
Metrics
biblio
Hermes: Secure heterogeneous multicore architecture design
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
Program processors
trust-aware routing algorithm
tenant security
system-on-chip
system-level integration
SoC design
security
secure heterogeneous multicore architecture design
secure cores
Scalability
Resiliency
resilience
pubcrawl
programmable secure router interface
programmable RISC cores
programmable distributed group key management scheme
accelerator function units
nonsecure cores
multiprocessing systems
multiple processing elements
multilevel user-defined security
Multicore processing
multicore computing security
Multicore Computing
Metrics
Hermes architecture
Hardware
general-purpose system-on-chip architectures
DSP
ASIC
application executable code
biblio
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms
Submitted by grigby1 on Wed, 02/21/2018 - 1:37pm
page table maintenance
XMHF
virtualization based memory isolation
virtualisation
Virtual machine monitors
thread identification
storage management
software maintenance
security primitive
security of data
security
Scalability
Resiliency
resilience
pubcrawl
address mapping validation
multiprocessing systems
multicore setting
Multicore processing
multicore platforms
multicore computing security
Multicore Computing
Metrics
memory isolation security
Kernel
Instruction sets
Hardware
fully isolated microcomputing environment
FIMCE
BitVisor
biblio
Multi-factor authentication using accelerometers for the Internet-of-Things
Submitted by grigby1 on Thu, 02/15/2018 - 11:48am
Metrics
sensor security
security of data
security harvesting
Resiliency
resilience
pubcrawl
Protocols
Pins
multifactor authentication
Multi-factor authentication
mobile devices
mobile computing
Accelerometers
IoT
Internet-of-Things
Internet of Things
Human Factors
human factor
Human behavior
Hardware
experimental embedded system
embedded systems
embedded devices
authentication
« first
‹ previous
…
50
51
52
53
54
55
56
57
58
…
next ›
last »