Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource consumption
biblio
The Survey on Intellectual Property Based on Blockchain Technology
Submitted by grigby1 on Thu, 07/30/2020 - 1:50pm
bitcoin
ip protection
transaction throughput
transaction anonymity
Time delay
Tamper-Resistance
resource consumption
Proof of Stake
optimization mechanisms
encryption algorith
cross-chain
copyrights
copyright
consensus mechanism
blockchain system
cryptocurrencies
optimisation
composability
Industries
internet
blockchain technology
intellectual property
optimization
Resiliency
resilience
policy-based governance
pubcrawl
Distributed databases
blockchain
biblio
DifFuzz: Differential Fuzzing for Side-Channel Analysis
Submitted by aekwall on Mon, 03/09/2020 - 11:13am
dynamic analysis
predictability
Security Heuristics
unknown side-channel vulnerabilities
secret-dependent paths
secret program data
resource-guided heuristics
resource usage
resource consumption
Performance analysis
Java programs
fuzzing-based approach
DifFuzz
differential fuzzing
side-channel attacks
side-channel analysis
security of data
fuzzing
side-channel
Time factors
Instruments
execution time
program diagnostics
Java
Correlation
tools
vulnerability detection
pubcrawl
Resiliency
Cryptography
Scalability
biblio
Attack graph — Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
Submitted by grigby1 on Wed, 01/16/2019 - 2:25pm
RPL DODAG
rank property
Resiliency
resource constrained Low Power and Lossy Networks
resource consumption
Routing
routing path optimization
Routing protocols
routing requirements
routing security
RPL attacks
rank based data path validation
RPL-6LOWPAN
security
security attacks
security breaches
sensor nodes
telecommunication network topology
topological isolation
topological sub-optimization
traffic disruption
vulnerability assessment
IP networks
attack graph
communication protocol
composability
computer network security
destination oriented directed acyclic graphs
directed graphs
expected transmission count
holistic security assessment
Internet of Things
IoT networks
6LoWPAN
IPv6 Routing Protocol
LLNs
loop free topology
low-power wireless personal area network
network topology
objective function
packet delivery rate
personal area networks
pubcrawl
biblio
Verifying and Synthesizing Constant-Resource Implementations with Types
Submitted by K_Hooper on Wed, 02/28/2018 - 11:31am
programs verification
type inference algorithm
timing channels
Syntactics
static analysis
standards
side channel attacks
Semantics
resource-aware noninterference
resource consumption
resource aware ML
resource analysis
resource allocation
pubcrawl
AARA
programming
program verification
language-based security
information flow tracking
Information Flow
inference mechanisms
encryption
Cryptography
constant-resource behavior implementations
Compositionality
cognition
automatic amortized resource analysis
biblio
Implementation and optimization of A5-1 algorithm on coarse-grained reconfigurable cryptographic logic array
Submitted by grigby1 on Wed, 02/21/2018 - 1:41pm
resource allocation
Microelectronic Security
Noise measurement
performance optimization
pubcrawl
real-time requirements
reconfigurable architectures
resilience
Resiliency
Metrics
resource consumption
resource-based path seeking algorithm
RPS adaptive algorithm
shift registers
stream cipher
telecommunication security
Throughput
voice data encryption
coarse-grained reconfigurable cryptographic logic array
A5-1 algorithm optimization
Algorithm design and analysis
application specific integrated circuits
ASIC
bit rate 162.87 Mbit/s
cellular radio
CGRCA
Ciphers
A5-1
composability
Conferences
Cryptography
field programmable gate arrays
FPGA
frequency 162.87 MHz
GSM