Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170112
biblio
Critical Node Detection Problem Solving on GPU and in the Cloud
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
Approximation algorithms
Cloud Computing
CNDP
critical node detection problem
data structures
Electronic mail
gpu
graph theory
graph-theoretical problem
graphics processing units
NP-complete problem
optimisation
parallel algorithms
Performance analysis
pubcrawl170112
Runtime
biblio
Blue mining
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
marine research institutions
vertical transport system
sustainable exploration
sustainable development
socio-economic effects
resource discovery
resource assessment
pubcrawl170112
polymetallic nodules
offshore installations
offshore industries
mining
Biological system modeling
Hydrodynamics
geophysical prospecting
environmental sustainability
environmental regulation
environmental legislation
economic sustainability
Earth
Deep Sea Mining
deep sea mineral resources extraction
blue mining
biblio
Privacy-preserving functional IP verification utilizing fully homomorphic encryption
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
IP theft
system-on-chip
SoC design
sequential benchmark circuits
security parameter sizes
pubcrawl170112
privacy-preserving version
privacy-preserving functional IP verification
Noise
magnitude IP verification
Logic gates
Libraries
IP users
Cryptography
IP reuse
IP networks
IP core
intellectual property verification
industrial property
IC industry
IC design business model
globalized supply chain
functional verification
fully homomorphic encryption
encryption
data privacy
biblio
An efficient hardware implementation of few lightweight block cipher
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
FPGA
sensor node
security system
Schedules
RFID
resource-efficient cryptographic incipient
radiofrequency identification
radio-frequency identification
pubcrawl170112
high level synthesis
Hardware Implementation
Hardware
Algorithm design and analysis
field programmable gate arrays
Field Programmable Gate Array (FPGA)
FeW lightweight block cipher
FeW cryptography algorithm
FeW Algorithm
Feistel structure
encryption
Cryptography
Ciphers
Block Cipher
biblio
A Novel PUF Based SST to Prevent Distribution of Rejected ICs from Untrusted Assembly
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
intellectual property infringement
untrusted assembly packaging and test
security issue
secure split test
rejected IC distribution
PUF based SST
pubcrawl170112
Physical Unclonable Function
partially functional chip
intellectual property rights
connecticut sst
integrated circuit manufacture
integrated circuit cloning
Information systems
industrial property
hardware metering
faulty chip
counterfeiting
copy protection
biblio
Efficient and secure split manufacturing via obfuscated built-in self-authentication
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
Layout
untrusted foundries
trustworthiness
supply chains
split manufacturing
semiconductor supply chain
reverse engineering
pubcrawl170112
OBISA circuit
obfuscated built-in self-authentication
Logic gates
chip layout
IP piracy
invasive software
integrated circuits
integrated circuit reliability
integrated circuit manufacture
hardware Trojan insertion
Foundries
fabrication
delays
biblio
An RFID-based technology for electronic component and system Counterfeit detection and Traceability
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
production engineering computing
system counterfeit detection
supply chains
Supply Chain
Spartan 3E FPGA
Sensor Systems
RFID-based technology
RFID-based system
RFID tag
RF
radiofrequency identification
radio frequency communication
Radio frequency
Radiation detectors
pubcrawl170112
counterfeit goods
printed slot antenna
printed circuits
printed circuit board
PCB prototype
on-chip sensors
multiple counterfeit IC types
microstrip antennas
in-system structures
field programmable gate arrays
Electronic components
electronic component
device provenance
CST
counterfeit integrated circuits
biblio
Detecting untestable hardware Trojan with non-intrusive concurrent on line testing
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
manufacturing testing
untestable hardware trojan
Trojan horses
security
Radiation detectors
pubcrawl170112
nonintrusive concurrent on line testing
Monitoring
microprocessor chips
built-in self-test
manufacturing stage
manufacturing cycle
integrated circuit testing
HT
Hardware
Europe
circuit geometrical characteristics
chip supply chain
biblio
LADP: A lightweight authentication and delegation protocol for RFID tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
protocol
telecommunication security
Supply Chain
RFID tags
RFID security
RFID privacy
RFID
Resists
radiofrequency identification
PUF-enabled tags
pubcrawl170112
Protocols
authentication
privacy
physically unclonable function
ownership transfer process
owner privacy protection
lightweight authentication-and-delegation protocol
LADP
delegation
data privacy
Cryptographic Protocols
computation cost reduction
communication cost reduction
biblio
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags
Submitted by grigby1 on Wed, 03/08/2017 - 2:32pm
NIST randomness test
telecommunication security
symmetric-key cryptographic operations
Security analysis
RFID tags
randomness test
random number generation
radiofrequency identification
pubcrawl170112
polynomials
NIST SP800-22
cryptanalysis
NIST
low-cost RFID tags
lightweight pseudorandom number generators
lightweight PRNG
LFSR-based PRNG security
international RFID standards
Generators
EPC Gen2 tags
EPC Gen2 RFID tag
Cryptography
1
2
3
4
5
6
next ›
last »