Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT applications
biblio
Towards Sustainable IoT Ecosystem
Submitted by aekwall on Tue, 08/17/2021 - 3:06pm
composability
ipv6 security
IoT threats
IoT privacy and security
IoT ecosystem
IoT communication protocols
IoT architecture
IoT applications
Ecosystems
policy-based governance
security
Resiliency
Metrics
pubcrawl
resilience
Protocols
authentication
Internet of Things
Medical services
biblio
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
Submitted by aekwall on Mon, 03/29/2021 - 11:08am
Hash functions
unique ledger
tree-chain
scalable fast blockchain instantiation
parallel chain branches
nonmonetary applications
high transaction delays
hash function output
fast lightweight consensus algorithm
consensus code
Consensus algorithm
computationally expensive validator selection
hash algorithms
Cryptography
Compositionality
Public key
Throughput
pubcrawl
delays
trees (mathematics)
blockchain
Resiliency
IoT applications
Internet of Things (IoT)
security
Internet of Things
biblio
Measuring Trustworthiness of IoT Image Sensor Data Using Other Sensors’ Complementary Multimodal Data
Submitted by aekwall on Mon, 12/07/2020 - 11:31am
uncertainty handling
trustworthy measure
temperature sensor data
numerical data
multimodal
IoT sensor data
IoT image sensor data
image sensors
image sensor data
DST framework
Dempster-Shafer Theory
complementary multimodal data
authentic forged image data
Temperature distribution
Temperature sensors
security of data
Numerical models
inference mechanisms
Internet of Things applications
sensor fusion
trustworthiness
trust
composability
pubcrawl
learning (artificial intelligence)
Data models
Trusted Computing
IoT applications
Internet of Things
biblio
Securing IoT Devices and SecurelyConnecting the Dots Using REST API and Middleware
Submitted by grigby1 on Thu, 07/30/2020 - 1:14pm
IoT devices
security
secure IoT system
REST API
Resiliency
resilience
representational state transfer API
pubcrawl
middleware
Metrics
Logic gates
IoT systems
IoT security
application program interfaces
IoT applications
IoT
Internet of Things
Human Factors
Human behavior
fairly disruptive technology
data privacy
computer network security
composability
Cloud Computing
authorization
authentication
biblio
Grouping-Proofs Based Access Control Using KP-ABE for IoT Applications
Submitted by grigby1 on Fri, 07/24/2020 - 11:31am
KP-ABE
threshold grouping-proofs
Security analysis
Scalability
RFID systems
radiofrequency identification
Public key
pubcrawl
policy-based governance
Pairing Cryptography
message encryption
KP-ABE protocol
Access Control
key-policy attribute-based encryption
key policy attribute based encryption
IoT applications
Internet of Things
grouping-proofs based access control
Grouping proofs
encryption
Cryptographic Protocols
collaboration
authorize NFC payment
authorisation
biblio
Machine Learning Security Allocation in IoT
Submitted by grigby1 on Fri, 06/26/2020 - 12:04pm
pubcrawl
IoT situation
IoT-helped vitality obliged stages
learning (artificial intelligence)
light-weighted profound learning base framework
Metrics
mobile phones
nearby facial pictures dataset
numerous asset compelled gadgets mobile phones
ongoing facial picture recovery frameworks
picture utilizing Viola-Jones calculation
proficiency
IoT condition
question
Raspberry Pi
Resiliency
Scalability
security
security allocation
Shape
Support vector machines
utilizes convolutional framework layers
Viola-Jones calculation
vitality obliged gadgets
extra face classifier
cell phones
Cellular phones
characterized highlights
CNN
composability
computational abilities
computational intricacy
constant recovery
convolutional neural nets
crop face areas
edge detection
archive pictures
Face
face pictures
face recognition
feature extraction
financially savvy pre-prepared CNN
huge information vault
Image edge detection
Internet of Things
IoT
IoT applications
biblio
Trustworthy configuration management for networked devices using distributed ledgers
Submitted by aekwall on Mon, 05/11/2020 - 10:28am
distributed execution environment
network accountability
blockchain-based distributed ledger
Building automation
Byzantine fault tolerant configuration management system
CMS
Configuration Management
configuration management process
critical configurations
data leaks
distributed ledgers
individual malicious administrators
industrial sites
IT systems
multiparty authorization
networked devices
process control
strong connection
targeted devices
trustworthy configuration management
fault tolerant computing
authorisation
authorization
Organizations
Internet of Things
IoT applications
Resiliency
pubcrawl
composability
Metrics
security of data
message authentication
security threats
Proposals
control engineering computing
fault tolerance
Traceability
physical world
Fabrics
biblio
Scalable QAM Modulation for Physical Layer Security of Wireless Networks
Submitted by aekwall on Mon, 03/16/2020 - 9:33am
wireless networks
Scalable Security
wireless channel
scalable quadrature modulation
scalable QAM
quadrature amplitude modulation
QAM modulation
OFDM
Internet of Things concept
FFT
connected devices
cryptographic algorithms
IoT
wireless channels
Scalability
energy consumption
physical layer security
Data protection
pubcrawl
IoT applications
IoT devices
Internet of Things
computer network security
biblio
Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application
Submitted by aekwall on Mon, 02/10/2020 - 10:44am
piccolo encryption algorithm
4 input LUTs
64 bits block size
area optimization
ASIC
constrained RFID application
different design strategies
efficient hardware architecture
Fiestel structure
hardware design
hardware metrics
low resource applications
optimized area
Piccolo Algorithm
128 bits
piccolo lightweight algorithm
radiofrequency identification
relevant lightweight block ciphers
severe security concerns
supports high speed
Throughput.
tremendous pace
ultra-lightweight applications
variable key size
word length 64.0 bit
word length 80.0 bit
Xillinx
Microelectronics Security
security applications
field programmable gate arrays
FPGA
Cryptography
encryption
Internet of Things
telecommunication security
Hardware
Table lookup
IoT applications
smart devices
Resiliency
pubcrawl
composability
IoT
RFID
Throughput
Ciphers
security issues
Predictive Metrics
private information
word length 128.0 bit
Hardware Implementation
hardware resources
lightweight cryptographic algorithms
S-box
lightweight cryptography
biblio
A Security Architecture for RISC-V based IoT Devices
Submitted by aekwall on Mon, 02/10/2020 - 10:43am
small and medium-sized enterprises
RISC-V
RISC-V based IoT devices
RISC-V ISA
Scalability
scalable computing subsystem
Scalable Security
Secure Boot
secure deployment
security architecture
security concept
SIP
Resiliency
small-to-medium enterprises
SME
Software
strict power constraints
system-in-package
system-on-chip
three dimensional system-in-package
Universal Sensor Platform SoC
USeP SoC
watchdog timer
Internet of Things
authenticated watchdog timer
automation
composability
core security features
Cryptography
customizable Internet of Things platform
Device Security
embedded devices
Fraunhofer Institutes
Hardware
3D-SiP
IoT
IoT applications
IoT market
medium security level
Microelectronics Security
Monitoring
p
Predictive Metrics
pubcrawl
reduced instruction set computing
1
2
3
next ›
last »