Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
verification
biblio
PrivAnalyzer: Measuring the Efficacy of Linux Privilege Use
Submitted by aekwall on Mon, 10/26/2020 - 11:46am
formal verification
Linux Operating System Security
term rewriting
ROSA model checker
privileged open source programs
privilege escalation attacks
PrivAnalyzer
LLVM-based C/C++ compiler
Linux privileges
Linux privilege use
ChronoPriv
AutoPriv
operating systems
dynamic analysis
verification
static analysis
security
program compilers
Predictive Metrics
program diagnostics
Containers
Analytical models
tools
Metrics
composability
pubcrawl
Resiliency
Linux
Program processors
Access Control
security of data
biblio
Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Submitted by grigby1 on Fri, 10/16/2020 - 11:23am
LTL
verification
tools
SPIN verifier
SPIN formal verifier
SPIN
Security analysis
Resiliency
resilience
pubcrawl
Protocol Security
Promela language
policy-based governance
model checking
MITM
man in the middle attack
authentication
Linear Temporal Logic
government data processing
formal verification
Electronic voting systems
electronic voting system
electronic voting protocol
electronic voting
e-voting
E-Government
data substitution
Cybersecurity
Cryptographic Protocols
cryptographic protocol
collaboration
biblio
Decentralized Verification for Dissipativity of Cascade Interconnected Systems
Submitted by grigby1 on Mon, 10/05/2020 - 1:49pm
learning-enabled subsystems
verification process
verification
subsystem parameters
Stability analysis
reinforcement learning algorithm
q-learning
pubcrawl
multivariable systems
model-free learning structure
minimum knowledge
Matrices
Mathematical model
linear subsystems
autonomous systems
learning (artificial intelligence)
largescale networks
large-scale cascade interconnections
Interconnected Systems
dissipativity properties
dissipativity
decentralized verification rule
Couplings
control system synthesis
Compositionality
cascade systems
cascade interconnected systems
biblio
Formalizing Constructive Cryptography using CryptHOL
Submitted by aekwall on Mon, 09/14/2020 - 12:27pm
Theorem Proving
composability
random systems
proof rules
information-theoretically secure channel
game-based proofs
CryptHOL
constructive cryptography
computer-aided cryptography
composable cryptographic security statements
computer aided cryptography
universal composability
complex system
Cryptography
cryptographic proofs
formal methods
verification
formal verification
computer science
Complexity theory
Probabilistic logic
tools
pubcrawl
game theory
encryption
biblio
A New Approach of Digital Signature Verification based on BioGamal Algorithm
Submitted by aekwall on Mon, 06/22/2020 - 11:25am
Communication Network
SHA algorithm
secured digital signature algorithm
secure hash code
secure digital signature
existing PlayGamal algorithm
digital signature verification
BioGamal algorithm
encryption algorithm
sensitive information
security of data
digital signature
verification
digital signatures
Cryptography
pubcrawl
Resiliency
security
Data Security
Scalability
biblio
Addressing Verification and Validation Challenges in Future Cyber-Physical Systems
Submitted by aekwall on Mon, 06/01/2020 - 10:53am
policy-based governance
verification
validation techniques
Validation challenges
validation
V&V process
traditional verification
strategic perspective
security of data
Resiliency
resilience
pubcrawl
composability
physical parts
nontraditional middleware
nonexplainable software outputs
middleware security
middleware
H2020 ADVANCE project
future cyber-physical systems
formal verification
cyber-physical systems
computation parts
biblio
A Formal Approach to Secure Speculation
Submitted by grigby1 on Fri, 04/03/2020 - 12:55pm
SMT
meltdown
microarchitectural side-channels
mitigation
observational-determinism
out-of-order-execution
safety-property
secure speculation property
secure speculative execution
side-channel
information-flow
software mitigations
Spectre
speculation
trace property-dependent observational determinism
trace-property
transient execution attacks
transient-execution
uclid5
resilience
formal verification
security
pubcrawl
Resiliency
verification
microarchitecture
Program processors
Transient analysis
Linux
Kernel
security of data
Metrics
Compositionality
provable security
formal
formal approach
Formal-Verification
hyperproperty
information flow security properties
biblio
A Mechanised Cryptographic Proof of the WireGuard Virtual Private Network Protocol
Submitted by grigby1 on Fri, 04/03/2020 - 12:43pm
open source Virtual Private Network
WireGuard virtual private network protocol
vpn
Virtual private networks
verification
transport data messages
standards
security protocols
pubcrawl
Protocols
protocol verification
privacy
policy-based governance
Policy Based Governance
authorisation
Noise Protocol Framework
IP networks
Elliptic curve cryptography
CryptoVerif proof assistant
Cryptographic Protocols
cryptographic protocol
cryptographic proof
computer network security
computational model
Compositionality
composability
collaboration
biblio
A Secure QR Code System for Sharing Personal Confidential Information
Submitted by aekwall on Mon, 03/30/2020 - 11:39am
Cryptography
cyber physical systems
decryption
encryption
pubcrawl
QR codes
Quick Response (QR) Code
Resiliency
RSA
Secure QR Code (SQRC)
Validation.
verification
biblio
A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties
Submitted by grigby1 on Wed, 03/18/2020 - 12:15pm
trusted third party
resilience
Resiliency
composability
pubcrawl
weak trust
verification
verifiable multiuser searchable encryption schemes
verifiable dynamic multiuser searchable encryption scheme
user search permissions
user permission
user access permission matrices
Cryptography
secure data sharing
multiuser settings
multiuser searchable encryption schemes
dynamic management
Multi-user
encrypted data
searchable encryption
public key cryptography
cloud server
Cloud Computing
authorisation
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »