Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secret keys
biblio
Securing Mobile Data Collectors by Integrating Software Attestation and Encrypted Data Repositories
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
mobile data collectors
composability
pubcrawl
Human behavior
Resiliency
whitebox cryptography
tampered drones
Table lookup
software-based attestation
software integrity
software attestation
secure communications
secret key protection
privacy-sensitive data
security of data
malicious physical/cyber attacks
group attestation scheme
drones
data repositories
data memory
data encryption
code attestation technique
malware
attestation
secret keys
private key cryptography
data privacy
encryption
biblio
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 11:58am
Receivers
key size
Lagrange Polynomial
Linear Secret Sharing
private key cryptography
Productivity
Puncturable Attribute Based Encryption schemes
Puncturable Attribute-Based Encryption
punctured keys
key distributor
secret keys
secure data delivery
telecommunication security
Human behavior
pubcrawl
collaboration
policy-based governance
Scalability
key distribution center
IoT devices
Internet-of-Things
Internet of Things
forward encryption
fine grained access control
decryption
cybercriminals
Conferences
attribute-based key
attribute based encryption
attribute-based encryption
Access Control
encryption
authorisation
biblio
A Practical Quantum Public-Key Encryption Model
Submitted by grigby1 on Mon, 03/05/2018 - 1:04pm
public key cryptography
secret keys
Resiliency
resilience
quantum trapdoor one-way function
quantum public-key encryption model
quantum public key encryption model
Quantum mechanics
quantum information security
quantum cryptography
quantum computing
black box encryption
Public key
pubcrawl
Metrics
encryption
decryption process
Computational modeling
computational indistinguishability
composability
blackbox client-side
biblio
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs
Submitted by grigby1 on Tue, 12/12/2017 - 1:31pm
integrity
test structures
system-on-chips
system-on-chip
SoC integration
Security Policies Analysis
secure microprocessors
secret keys
pubcrawl
policy-based governance
memory read-write functions
Logic gates
IP networks
internal modules
asset protection
information leakage vulnerabilities
encryption algorithms
encryption
Discrete Fourier transforms
design-for-test exploits
design for testability
Cryptography
Controllability
control finite state machines
confidentiality
collaboration
availability policies
automated security vulnerability analysis framework
« first
‹ previous
1
2