Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
embedded security
biblio
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Submitted by aekwall on Mon, 12/02/2019 - 12:04pm
embedded security
Tibouchis degenerate curve attack
Supersingular curve
singular curve point decompression attacks
Singular curve
Rapsberry Pi single board computer
OpenSSL command line tools
OpenSSL
Neves curve attack
Loading
Invalid curve attack
Fault attack
Servers
elliptic curve parameters
Bitcoin curve
command injection attacks
Elliptic curves
Elliptic curve cryptography
public key cryptography
Metrics
composability
pubcrawl
Resiliency
encryption
biblio
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures
Submitted by aekwall on Tue, 10/22/2019 - 9:54am
DREAD risk assessment model
Security Policies Analysis
threat modelling
STRIDE threat modelling
STRIDE
Security Modelling
Secure by design
policy-based security modelling
policy-based security enforcement
policy update
OEMs
Guidelines
embedded security
embedded architectures
security of data
device life-cycle
connected vehicles
configurable policy engine
Biological system modeling
application threat analysis
Policy
risk management
policy-based governance
pubcrawl
embedded systems
Software
Hardware
Access Control
biblio
Hardware Based Two-Factor User Authentication for the Internet of Things
Submitted by grigby1 on Fri, 02/08/2019 - 4:34pm
authentication
embedded security
Hardware
Human behavior
Human Factors
Internet of Things
Protocols
pubcrawl
public key infrastructure
sensors
Smart card
smart cards
two factor authentication
two-factor authentication
wireless sensor networks
biblio
Internet of things (IoT) design considerations for developers and manufacturers
Submitted by K_Hooper on Wed, 05/09/2018 - 10:59am
large-scale interconnectivity
smart devices
sensors
Security by Default
Security Assurance
Scalability
Resiliency
recommended design considerations
pubcrawl
Protocols
Monitoring
authentication
IoT ecosystem
IoT Design
IoT application
IoT
Internet of Things
information security
embedded systems
embedded security
computer network security
Business
biblio
Analyzing the Security and Privacy of Cloud-based Video Surveillance Systems
Submitted by grigby1 on Tue, 06/27/2017 - 1:48pm
cloud
Damage Assessment
embedded security
home automation
Internet of Things
Metrics
pentesting
privacy
pubcrawl
Resiliency
Scalability
Security analysis
surveillance systems
user privacy
user privacy in the cloud
video surveillance
« first
‹ previous
1
2