Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security
biblio
Performance evaluation of security mechanisms in RAOLSR protocol for Wireless Mesh Networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:42am
radio aware optimized link state routing
WMN
wireless mesh networks
topology control
telecommunication network topology
telecommunication control
security mechanisms
security
Routing protocols
Routing Protocol
Routing
Cryptography
network simulator-3 simulations
IEEE 802.11 Standards
identity based encryption
IBE-RAOLSR protocols
IBE
hello messages
elliptic curve digital signature algorithm
ECDSA-RAOLSR protocols
digital signatures
delays
biblio
Combating Software and Sybil Attacks to Data Integrity in Crowd-Sourced Embedded Systems
Submitted by BrandonB on Fri, 05/01/2015 - 8:27am
critical systems
crowd-sourced sensing
data integrity
embedded systems
mobile computing
security
trust
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 8:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption
biblio
Performance analysis for extended TLS with mutual attestation for platform integrity assurance
Submitted by BrandonB on Fri, 05/01/2015 - 8:12am
Remote Attestation
Web-based application
web services
Web service security
Web servers
Web browsers
trustworthiness
trusted computing group
Trusted Computing
SSL-TLS protocol
security
Apache Web server
Protocols
principal component analysis
platform integrity assurance
mutual attestation mechanism
Mozilla Firefox browser
Internet connectivity
extended TLS
endpoint platforms
client-server environment
Browsers
biblio
Integrity based relationships and trustworthy communication between network participants
Submitted by BrandonB on Fri, 05/01/2015 - 8:10am
OSI layer 2
Unicast
trustworthy communication
Trusted Platform Module
Trusted Computing
trust establishment
trust
Servers
security
Protocols
protocol design
Payloads
participating node
authenticated node
operating system integrity
network participants
integrity based relationship
integrity
insider threat
industrial networks
encryption
cyber-physical systems
Cryptographic Protocols
computer network security
authentication protocol
authentication
biblio
Reconfigurable Dynamic Trusted Platform Module for Control Flow Checking
Submitted by BrandonB on Fri, 05/01/2015 - 8:10am
Pipelines
Trusted Computing
stack smashing
Software
security of data
security
Runtime Security
runtime attacks
Runtime
reconfigurable dynamic trusted platform module
Reconfigurable Architecture
processor pipeline
Benchmark testing
Instruction Set Architecture
FPGA
formal verification
field programmable gate arrays
dynamic TPM design
Dynamic TPM
control flow checking
computer architecture
code reuse
buffer overflow
biblio
Trusted Platform Module for Smart Cards
Submitted by BrandonB on Fri, 05/01/2015 - 8:09am
near-field communication
User Centric Tamper-Resistant Device
user centric smart card ownership model
UCTD
UCOM
trusted service manager
Trusted Platform Module
Trusted Execution Environment
TEE
smart cards
security
Runtime
privacy preservation platforms
off-card trusted relationship
application provider
near field communication-based mobile phone services
multiapplication smart card initiative
Mobile handsets
Mobile communication
Hardware
global platform consumer centric model
embedded devices
deployment model
data privacy
cross-device security
computer architecture
Computational modeling
biblio
ISO/IEC/IEEE International Standard for Information technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Part 1AR: Secure device identity
Submitted by BrandonB on Fri, 05/01/2015 - 7:57am
Local area networks
X.509
security
secure device identifier
secure association
port-based network access control
PKI
network security
Metropolitan area networks
MANs
MAC security
Access Control
LANs
ISO standards
information technology
IEEE standards
IEC standards
certificate
authorization
authentication
Access controls
biblio
Secret key generation in correlated multi-dimensional Gaussian channels
Submitted by BrandonB on Fri, 05/01/2015 - 7:35am
secret key generation
wireless networks
Wireless communication
wireless channels
wireless channel reciprocity
wide-sense stationary wireless channels
Time-frequency Analysis
time-domain analysis
time selectivity
time domains
telecommunication security
spatial domains
spatial correlation
signal-to-noise ratio
Signal to noise ratio
security
analytical framework
radio networks
public key cryptography
public channel
multiple antenna eavesdroppers
intrinsic secrecy content
Gaussian channels
frequency-domain analysis
frequency domains
Covariance matrices
correlated multidimensional Gaussian channels
confidential communications
Communication system security
asymptotic analysis
antenna arrays
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Fri, 05/01/2015 - 7:32am
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
« first
‹ previous
…
428
429
430
431
432
433
434
435
436
…
next ›
last »