Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
tpm
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Openstack: Launch a Secure User Virtual Machine Image into a Trust Public Cloud IaaS Environment
Submitted by grigby1 on Mon, 03/09/2020 - 1:27pm
tpm
policy-based governance
pubcrawl
Resiliency
Scalability
secure launch user VMI
secure user virtual machine image
security
security policy
Software
openstack
trust cloud environment
trust public cloud IaaS environment
Trusted Computing
user VMI requirements
virtual machine security
virtual machines
Virtual machining
VMI
Cryptography
cloud computing architecture
Cloud Management Platforms
cloud-delivered model
CMP
Computational modeling
computer architecture
confidentiality
cryptographic techniques
Cloud Computing
cryptology
enhanced TPM remote attestation
Human behavior
IaaS
IaaS classical processes
infrastructure-as-a-service
Launch
Metrics
biblio
Protecting Agents from Malicious Hosts using Trusted Platform Modules (TPM)
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
mobile agent system
Trusted Platfrom Modules
trusted platform modules
tpm
Task Analysis
software agents
software agent usage approach
security of data
security mechanisms
security experts
secure protocol
Resiliency
pubcrawl
Protocols
mobile agents
agent based system builders
malicious host
Java agent development framework
Java
JADE
Hardware Protection
eminent scientific community
Data processing
Cryptography
Conferences
computing problems
computing paradigm
composability
Agent Protection
biblio
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
Safety
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TPMs
tpm
system manipulation
Software
security of data
security mechanisms
security
secure elements
Availability
Resiliency
Reliability
Redundancy
pubcrawl
Industry 4.0
Hardware
embedded systems
dependability features
cyber-physical systems
cyber-attacks
cyber physical systems
composability
biblio
FADETPM: Novel approach of file assured deletion based on trusted platform module
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
Scalability
Handheld computers
integrity
internet
Memory
offline data storage
outsourced data files
privacy
pubcrawl
File Assured Deletion
SSP
storage management
storage service provider
tpm
Trusted Computing
Trusted Platform Module
VANISH
Business
file access policies
FADETPM
FADE
Ephemerizer
data privacy
data integrity
data deletion
Cryptography
cryptographic issues
computer storage space
computer storage management
computer security
cloud storage
Cloud Computing
business risk
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
Organization of the Entrusted Calculations in Crucial Objects of Informatization under Uncertainty
Submitted by grigby1 on Tue, 02/06/2018 - 1:59pm
Prototypes
trusted platform modules
Trusted Platform Module
Trusted Computing
TPM technology (Trusted Platform Module)
tpm
the prevention of activation of not declared opportunities
the entrusted domestic environment of calculations
safe calculations
root of trust
Resiliency
Registers
pubcrawl
composability
Organizations
informatization
hypervisor security
Hardware
entrusted calculations
encoding
domestic electronic base
Cryptography
crucial objects
control of complex objects under uncertainty
Computers
biblio
Security in Container-based Virtualization Through vTPM
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
Cloud Computing
composability
pubcrawl
Resiliency
security
tpm
Trusted Computing
Trusted Platform Module
trusted platform modules
vTPM
biblio
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices
Submitted by grigby1 on Tue, 05/16/2017 - 12:41pm
composability
Embedded Systems Security
Human behavior
Metrics
network accountability
Provenance
pubcrawl
Resiliency
tpm
USB
USB storage devices
biblio
An anonymous payment system to protect the privacy of electric vehicles
Submitted by BrandonB on Mon, 05/04/2015 - 2:15pm
Energy Provider Company
vehicles
Trusted Platform Module
Trusted Computing
tpm
Servers
secondary cells
Registers
recharging service
recharging infrastructure
Protocols
privacy protection
privacy
financial management
EPC
anonymous credential technique
electrical energy
Electric Vehicles
driver privacy
driver information systems
double spending detection
data privacy
Cryptography
battery powered vehicles
battery
batteries
automobile
authentication
anonymous payment system
« first
‹ previous
1
2
3
next ›
last »