Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
providing security
biblio
DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
Submitted by aekwall on Mon, 02/15/2021 - 3:48pm
energy conservation
wireless sensor networks
voronoi diagram paradigm
Voronoi diagram
sensed data
secure data exchange
Resiliency
pubcrawl
providing security
Protocols
military surveillance
environmental monitoring
energy efficient encryption
energy consumption
Aggregation
encryption
efficient encryption
Decryption Technique
decryption
DEAVD protocol compresses data
data encryption
data communication
data aggregation
cyber physical systems
Cryptography
Cryptographic Protocols
computational geometry
composability
biblio
Towards a Security Cost Model for Cyber-Physical Systems
Submitted by aekwall on Mon, 01/13/2020 - 11:17am
cyber attack
actuator security
security incident
security costs
security cost model
resulting costs
providing security
physical world
onion layer model
flexible systems
engineering secure systems
Cost of security
CPS
actuators
security of data
sensors
Measurement
Mathematical model
Industry 4.0
Metrics
composability
pubcrawl
Human behavior
Resiliency
cyber-physical systems
Task Analysis
security
Cloud Computing
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 10:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs