Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet infrastructure
biblio
T2DNS: A Third-Party DNS Service with Privacy Preservation and Trustworthiness
Submitted by aekwall on Mon, 12/21/2020 - 12:35pm
IP networks
trustworthiness
Trusted Computing
third-party DNS service
Third-Party DNS
T2DNS
service proxy
Servers
server attackers
pubcrawl
Protocols
privacy preservation
privacy
obfuscation protocol
attestation
Internet infrastructure
internet
Intel SGX
initialization process
hybrid protocol
encryption protocol
encryption
data privacy
Cryptographic Protocols
computer network security
composability
client DNS queries
channel attackers
biblio
A novel approximate computing based security primitive for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 12:30pm
IoT devices
Watermarking
ultra-low power design requirement
Three-dimensional displays
telecommunication security
telecommunication power management
security primitive
Resiliency
pubcrawl
Metrics
Lightweight Encryption
IoT security
approximate computing
Internet of Things
Internet infrastructure
information hiding approach
Human Factors
Human behavior
hardware security vulnerabilities
Fingerprinting
digital watermarking
device authentication
Cryptography
composability
biblio
Protecting endpoint devices in IoT supply chain
Submitted by grigby1 on Wed, 03/08/2017 - 1:26pm
IoT supply chain
uniquely identifiable embedded computing devices
Traceability
supply chains
supply chain security
supply chain management
security issues
security challenges
secure access control
RFID-enabled solution
RFID tag
radiofrequency identification
pubcrawl170112
production engineering computing
privacy challenges
privacy
authentication
IoT device authentication
Internet of Things (IoT)
Internet of Things
Internet infrastructure
internet
Hardware
endpoint device protection
Endpoint Device
data transfer
data privacy
control chip
communication efficiency
centralized database
authorisation