Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Constrained Devices
biblio
Mc-PUF: Memory-based and Machine Learning Resilient Strong PUF for Device Authentication in Internet of Things
Submitted by aekwall on Thu, 12/01/2022 - 3:37pm
Measurement
security
Predictive models
authentication
pubcrawl
Resiliency
machine learning
Random access memory
Physical Unclonable Function
Resilient
Constrained Devices
Germanium
Mc-PUF
modeling attack
Resilient Security Architectures
biblio
Remote Attestation as a Service for Edge-Enabled IoT
Submitted by aekwall on Tue, 01/25/2022 - 2:49pm
Prototypes
Trusted Platform Module (TPM)
Smart healthcare
Remote Attestation
edge devices
data centers
Constrained Devices
attestation
Costs
Image edge detection
composability
Human behavior
Resiliency
pubcrawl
edge computing
Internet of Things (IoT)
performance evaluation
Cloud Computing
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
encryption
traditional cryptography algorithms
symmetric encryption
symmetric cipher
stream cipher
Salsa20
pseudorandom keys
NIST suite
NIST
lightweight cryptography
information technology
Information systems
hybrid modified lightweight algorithm
generated sequence keys
chaotic cryptography
data communication
cryptography algorithms PRESENT
Cryptography
Constrained Devices
computational complexity
Classification algorithms
Ciphers
cipher algorithm
chaotic system
chaotic communication
block ciphers
2D logistic map
pubcrawl
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
On the Feasibility of Attribute-Based Encryption on Constrained IoT Devices for Smart Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
ABE adoption
smart objects
Information systems
smart phones
Constrained Devices
performance evaluation
fine-grained access control
security challenges
Smart Systems
policy-based governance
ABE schemes
battery-powered devices
constrained IoT devices
flexible access policies
privacy challenges
public-key encryption
Sugar
data privacy
computer network security
Scalability
authorisation
Cryptography
encrypted data
encryption
Access Control
attribute-based encryption
security
attribute based encryption
Internet of Things
Protocols
embedded systems
mobile computing
Human behavior
pubcrawl
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
wireless sensor networks
technological vision
industrial IoT applications
fABElous
ciphertext-policy attribute-based encryption
broadcast
attribute-based scheme
ABE techniques
ABE scheme
CP-ABE
communication overhead
actuators
Constrained Devices
Intelligent sensors
Scalability
policy-based governance
pubcrawl
Human behavior
embedded devices
data integrity
Internet of Things
attribute-based encryption
abe
encryption
data confidentiality
Cryptography
authorisation
Access Control
biblio
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
Submitted by aekwall on Wed, 05/01/2019 - 11:38am
identity-based encryption schemes
Telecommunications
standards
smart meters
smart cards
Scalability
Resiliency
public key cryptography
pubcrawl
performance evaluation
pairing-based elliptic curve cryptography
Metrics
Bilinear Pairing
group signatures
embedded devices
Elliptic curves
Elliptic curve cryptography
digital signatures
Cryptography
Cryptographic Protocols
cryptographic libraries
Constrained Devices
bilinear pairing operation
biblio
A highly reliable dual-arbiter PUF for lightweight authentication protocols
Submitted by grigby1 on Wed, 05/16/2018 - 12:41pm
lightweight security alternative
Switches
security primitive
RFIDs
RFID
Resiliency
resilience
Reliability
radio frequency identification
PUF
pubcrawl
Protocols
authentication
lightweight authentication protocols
integrated circuit reliability
increased security
human factor
Human behavior
Hardware Security
dual arbiter PUF design
delays
Cryptographic Protocols
Constrained Devices
BER
biblio
I(FIB)F: Iterated bloom filters for routing in named data networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:48pm
information-centric networking
standards
Routing
Resiliency
resilience
pubcrawl
Policy-Governed Secure Collaboration
policy governance
named data networks
named data networking
Metrics
Memory management
iterative hashes
iterated bloom filters
Internet of Things
internet
clean slate
Information filters
Human Factors
human factor
Human behavior
hierarchical names
Future Internet
forwarding strategy
forwarding information base
energy supply
data structures
Cryptography
content distribution efficiency
Constrained Devices
collaboration
clean-slate redesign
biblio
Attribute-Based Encryption on a Resource Constrained Sensor in an Information-Centric Network
Submitted by grigby1 on Tue, 10/10/2017 - 9:58am
Attribute-Based Encryption (ABE)
CCN-lite
Constrained Devices
Content-Centric Network (CCN)
Information Centric Networks
Information-Centric Network (ICN)
Internet-of-Things (IoT)
pubcrawl
Resiliency
RIOT OS
Scalability
sensor networks