Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
counterfeiting
biblio
Securing IP Cores in CE Systems using Key-driven Hash-chaining based Steganography
Submitted by grigby1 on Thu, 10/20/2022 - 4:23pm
security
pubcrawl
Metrics
Hardware
Safety
privacy
integrated circuits
composability
Consumer electronics
Steganography
DSP
counterfeiting
digital signal processors
hardware steganography
steganography detection
biblio
A Block Chain based Management System for Detecting Counterfeit Product in Supply Chain
Submitted by grigby1 on Fri, 09/09/2022 - 4:05pm
supply chain security
Block Chain
blockchain
counterfeit products
counterfeiting
Government
Manufacturing industries
pubcrawl
Regulation
resilience
Resiliency
security
Supply Chain
supply chains
Traceability
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
medium-range FPGA device
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
Hamming distance
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
counterfeiting
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
field programmable gate arrays
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
biblio
Block-Supply Chain: A New Anti-Counterfeiting Supply Chain Using NFC and Blockchain
Submitted by aekwall on Mon, 02/18/2019 - 12:53pm
Scalability
Resiliency
Human behavior
pubcrawl
blockchain
consensus protocol
counterfeiting
Supply Chain
supply chain security
biblio
Hardware-Based Anti-Counterfeiting Techniques for Safeguarding Supply Chain Integrity
Submitted by grigby1 on Tue, 05/01/2018 - 11:35am
pubcrawl
system designer
supply chain security
supply chains
supply chain management
supply chain integrity
security matrices
Scalability
reverse engineering
Resiliency
resilience
Consumer electronics
product supply chain
IP theft
intellectual property laws
integrated circuits
Human behavior
hardware security-based techniques
hardware-based anti-counterfeiting
Hardware
counterfeiting
counterfeit detection
biblio
A Novel PUF Based SST to Prevent Distribution of Rejected ICs from Untrusted Assembly
Submitted by grigby1 on Wed, 03/08/2017 - 2:33pm
intellectual property infringement
untrusted assembly packaging and test
security issue
secure split test
rejected IC distribution
PUF based SST
pubcrawl170112
Physical Unclonable Function
partially functional chip
intellectual property rights
connecticut sst
integrated circuit manufacture
integrated circuit cloning
Information systems
industrial property
hardware metering
faulty chip
counterfeiting
copy protection
biblio
Object event visibility for anti-counterfeiting in RFID-enabled product supply chains
Submitted by grigby1 on Wed, 03/08/2017 - 2:28pm
object-centric coding mechanism
track-and-trace
taxonomy
system architecture framework
supply chains
supply chain management
Supply Chain
security measures
security
RFID-enabled product supply chain visibility
radiofrequency identification
pubcrawl170112
production engineering computing
anti-counterfeiting
object-based event “pedigree”
object event visibility
event pedigree
event exception detection
EPC-based events
Engines
e-pedigree
dynamically updated e-pedigree
Databases
counterfeiting activities
counterfeiting
anticounterfeiting
biblio
Hardware Design and Verification Techniques for Supply Chain Risk Mitigation
Submitted by grigby1 on Wed, 03/08/2017 - 2:25pm
integrated circuit design
Watermarking
supply chains
supply chain security risks mitigation
supply chain management
pubcrawl170112
overbuilding
metering
integrated circuits
concurrent checking
IC obfuscation
IC misusing
Hardware
Foundries
Fingerprinting
design automation
counterfeiting
concurrent engineering
biblio
Security on RFID technology
Submitted by grigby1 on Wed, 03/08/2017 - 2:23pm
building access
computing technologies
counterfeiting
Noise measurement
pubcrawl170112
radio frequency identification
radiofrequency identification
RFID
RFID data security
RFID systems
RFID technology
security of data
Security on RFID
supply chains
telecommunication computing
tracking livestock