Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
CRC
biblio
Low-overhead Solutions For Preventing Information Leakage Due To Hardware Trojan Horses
Submitted by grigby1 on Thu, 05/19/2022 - 1:03pm
Trojan horses
trojan horse detection
Information Leakage
CRC
mac
Microprocessors
Cyclones
Hardware Trojans
resource management
encryption
Runtime
composability
Hardware
FPGA
Resiliency
resilience
pubcrawl
biblio
Cyber – Transparencies, Assurance and Deterrence
Submitted by aekwall on Wed, 12/18/2019 - 2:36pm
safe-to-fail ecology
cyber-deterrence
cyber-ecology
cyber-scape
cyber-sûréte
deterrence-escalator
Ecology
fail-safe supervisory control and data acquisition system
influence
CSI
social trusts
socio-info-techno
state-based threat analysis
technological controls
threat equation
transparencies
trusts
warning time
Deterrence
Scalability
Trusted Computing
SCADA
Human behavior
pubcrawl
ontologies (artificial intelligence)
Ontology
resilience
security of data
collaboration by social influence
collaborative influence
conceptual-design paper
control
coordination by rule and control
CRC
cross disciplinary research strands
biblio
A lightweight RFID authentication protocol with confidentiality and anonymity
Submitted by grigby1 on Wed, 12/20/2017 - 1:05pm
privacy
telecommunication security
RFIDs
RFID tags
RFID system
RFID
Resiliency
replay attack
random number generation
radiofrequency identification
pubcrawl
pseudorandom number generator
Protocols
protocol
privacy and security
authentication
open wireless radio wave
on-chip CRC function
low-cost passive tags
location trace
lightweight RFID authentication protocol
Internet of Things
Human Factors
Human behavior
Hash functions
eavesdropping prevention
DOS-attack prevention
Cryptography
Cryptographic Protocols
CRC