Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security primitive
biblio
A highly reliable dual-arbiter PUF for lightweight authentication protocols
Submitted by grigby1 on Wed, 05/16/2018 - 12:41pm
lightweight security alternative
Switches
security primitive
RFIDs
RFID
Resiliency
resilience
Reliability
radio frequency identification
PUF
pubcrawl
Protocols
authentication
lightweight authentication protocols
integrated circuit reliability
increased security
human factor
Human behavior
Hardware Security
dual arbiter PUF design
delays
Cryptographic Protocols
Constrained Devices
BER
biblio
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms
Submitted by grigby1 on Wed, 02/21/2018 - 12:37pm
page table maintenance
XMHF
virtualization based memory isolation
virtualisation
Virtual machine monitors
thread identification
storage management
software maintenance
security primitive
security of data
security
Scalability
Resiliency
resilience
pubcrawl
address mapping validation
multiprocessing systems
multicore setting
Multicore processing
multicore platforms
multicore computing security
Multicore Computing
Metrics
memory isolation security
Kernel
Instruction sets
Hardware
fully isolated microcomputing environment
FIMCE
BitVisor
biblio
A novel approximate computing based security primitive for the Internet of Things
Submitted by grigby1 on Tue, 12/12/2017 - 12:30pm
IoT devices
Watermarking
ultra-low power design requirement
Three-dimensional displays
telecommunication security
telecommunication power management
security primitive
Resiliency
pubcrawl
Metrics
Lightweight Encryption
IoT security
approximate computing
Internet of Things
Internet infrastructure
information hiding approach
Human Factors
Human behavior
hardware security vulnerabilities
Fingerprinting
digital watermarking
device authentication
Cryptography
composability