Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computation power
biblio
Will Blockchain Technology Become a Reality in Sensor Networks?
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
telecommunication network routing
sensor networks
security features
resource-constrained wireless sensor network
private communication blockchain framework
memory storage
load balancing multihop routing shares
LBMH routing shares
control overhead reduction
constant bit rate
computation power
cluster heads
cluster head
battery life
blockchain technology
sensor security
telecommunication security
resource allocation
blockchain
Metrics
Computational modeling
sensor nodes
Peer-to-peer computing
Routing
wireless sensor networks
batteries
composability
pubcrawl
Human behavior
Resiliency
security
biblio
Hosting distributed databases on internet of things-scale devices
Submitted by grigby1 on Tue, 01/16/2018 - 5:33pm
Resiliency
pervasive computing
Pervasive Computing Security
physical devices
processing workload
pubcrawl
racked servers
Random access memory
Raspberry Pi
performance evaluation
Scalability
security
sensor nets
storage
system resiliency
testing
virtual machines
Virtual machining
Internet of Things
Cassandra distributed database
computation power
decentralized architecture
Distributed databases
distributed device deployment
Hardware
Human Factors
interconnected devices
benchmarks
Internet of Things-scale devices
IoT nodes
IoT representative devices
IoT-representative device specifications
Metrics
mobile computing
network compression
node configuration
biblio
Hardware security assurance in emerging IoT applications
Submitted by grigby1 on Thu, 04/20/2017 - 11:40am
IoT connected devices
Trojan horses
thwart hardware Trojan attack
side-channel analysis attack
Security Assurance
Scalability
Resiliency
Radiation detectors
pubcrawl
network on chip security
network on chip
network-on-chip
low-cost dynamic permutation method
IoT processing unit
accumulated partial guessing entropy
invasive software
Internet-of-Things (IoT)
Internet of Things
hardware trojan
hardware security assurance
Hardware Security
hardware attacks
Hardware
Cryptography
computation power
composability
Cisco