Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Hardware
biblio
Lightweight secure sensing using hardware isolation
Submitted by grigby1 on Thu, 04/20/2017 - 12:40pm
network on chip security
Xilinx Zynq-7000 SoC leveraging ARM TrustZone
wireless sensor networks
Temperature sensors
system-on-chip
security of data
Scalability
Resiliency
pubcrawl
composability
network on chip
Monitoring
lightweight secure sensing technique
hardware isolation
Hardware
delays
Cryptography
biblio
Hypervisor-Based Attestation of Virtual Environments
Submitted by grigby1 on Thu, 04/20/2017 - 12:29pm
Resiliency
Virtual machining
virtual machines
Virtual machine monitors
Virtualization
virtualisation
virtual environments
Trusted Computing
TPM device
Software
scalable remote attestation scheme
attestation
pubcrawl
private cloud
NFV
network function virtualization
Metrics
hypervisor-based attestation
Hardware
data privacy
computer architecture
Cloud Computing
biblio
XEBRA: XEn Based Remote Attestation
Submitted by grigby1 on Thu, 04/20/2017 - 12:29pm
XEn based remote attestation
remote host
remote computing device
remote machines
Resiliency
security
security of data
software based remote attestation technique
Trusted Computing
Virtualization
XEBRA
pubcrawl
attestation
code security
embedded platforms
embedded systems
Hardware
Intel Galileo board
Memory management
Metrics
performance evaluation
Protocols
biblio
Password authentication using Keystroke Biometrics
Submitted by grigby1 on Wed, 03/08/2017 - 2:47pm
password
user verification mechanism
user natural typing pattern
User behavior
typing pattern matching
Text recognition
Support vector machines
security
robust security technique
pubcrawl170115
pattern matching
password security
Password authentication
artificial neural network
neural nets
Monitoring
keystroke biometrics
Hardware
Europe
error rates
Error analysis
Classification algorithms
biometrics (access control)
authorisation
authentication
Artificial Neural Networks
biblio
Advanced pin entry method by resisting shoulder surfing attacks
Submitted by grigby1 on Wed, 03/08/2017 - 2:46pm
advanced pin entry method
authentication
Duplicate Login Pages
grid based authentication system
Hardware
Image color analysis
Keyboards
Keystroke Logging
Message Digest 5
Monitoring
PIN
pubcrawl170115
quantitative security investigation
shoulder surfing attacks
Software
telecommunication security
biblio
An efficient hardware implementation of few lightweight block cipher
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
FPGA
sensor node
security system
Schedules
RFID
resource-efficient cryptographic incipient
radiofrequency identification
radio-frequency identification
pubcrawl170112
high level synthesis
Hardware Implementation
Hardware
Algorithm design and analysis
field programmable gate arrays
Field Programmable Gate Array (FPGA)
FeW lightweight block cipher
FeW cryptography algorithm
FeW Algorithm
Feistel structure
encryption
Cryptography
Ciphers
Block Cipher
biblio
Detecting untestable hardware Trojan with non-intrusive concurrent on line testing
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
manufacturing testing
untestable hardware trojan
Trojan horses
security
Radiation detectors
pubcrawl170112
nonintrusive concurrent on line testing
Monitoring
microprocessor chips
built-in self-test
manufacturing stage
manufacturing cycle
integrated circuit testing
HT
Hardware
Europe
circuit geometrical characteristics
chip supply chain
biblio
Securing the supply chain for commodity IT devices by automated scenario generation
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
security of data
Hardware
Homeland Security
Microprogramming
nonUS suppliers
operating systems
program analysis
program diagnostics
pubcrawl170112
security
grave vulnerabilities
software components
static program analysis
Supply Chain
supply chain management
supply chain security
supply chains
Theseus
vetting process
component interaction mapping
attack graph generation
attack graph generation algorithms
automated scenario generation
Boolean functions
Boolean satisfiability solver
checklist generation workflow
commodity devices
commodity IT devices
adversary goals
computer architecture
cyber-attacks
DARPA VET program
DP industry
firmware
firmware-software architecture
FW-SW
graph theory
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 2:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
« first
‹ previous
…
56
57
58
59
60
61
62
63
64
…
next ›
last »