Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Secure Processing
biblio
Functionality and Security Co-Design Environment for Embedded Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:23am
recovery
Hardware
hardware development
intelligence surveillance and reconnaissance sensors
Lincoln asymmetric multicore processing architecture
Mission Assurance
mission functions
Multicore processing
multiprocessing systems
pubcrawl
functionality
resilience
resilient embedded system
Secure Processing
security
software development
Sophisticated Attacks
surveillance
System recovery
testbed
computer network security
Resiliency
adversarial cyber effects
anomalies detection
asymmetric multicore processing
Availability
co-design
co-design environment
command and control systems
Complexity theory
Resilient Security Architectures
critical missions
Cryptography
deliberate attacks
department of defense mission systems
DoD
electronic signal intelligence systems
electronic warfare
embedded systems
biblio
Hardware Support for Secure Stream Processing in Cloud Environments
Submitted by grigby1 on Mon, 06/11/2018 - 3:23pm
pubcrawl
Resiliency
Scalability
resilience
Metrics
homomorphic mac
network-on-a-chip
Secure Processing
stream processing
network on chip security
biblio
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 1:25pm
law enforcement
telecommunication traffic
telecommunication network routing
streaming design
source anonymity
Secure Processing
Scalability
Resiliency
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
Metrics
Light-weight
anonymous data sharing
Internet traffic
internet
Information Leakage
encryption
encrypted search capabilities
Elliptic curve cryptography
destination anonymity
data sharing
computer network security
circuit creation
Ciphers
anonymous routing