Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
high-profile attacks
biblio
Formally Verified Cryptographic Web Applications in WebAssembly
Submitted by aekwall on Mon, 12/02/2019 - 11:08am
verification
Protocols
pubcrawl
public domain software
Resiliency
Scalability
security-critical software
Servers
Signal
sophisticated custom cryptographic components
standard protocols
standards
toolchain
program verification
verification techniques
verification-oriented programming languages
verified cryptographic Web applications
verified HACL cryptographic library
verified implementation
verified-software
web-security
Webassembly
WebAssembly compilers
WebAssembly version
whatsapp
formal verification
Browsers
CoMP
compilation pipeline
compiler
compiler security
Compositionality
cryptographic code
Cryptographic Protocols
cryptographic-library
cryptographic-protocol-verification
Cryptography
authoring languages
high-assurance cryptographic libraries
high-profile attacks
instruction set
Java
JavaScript runtimes
Libraries
low-level subset
Metrics
modern Web applications
program compilers
program diagnostics
biblio
AZSPM: Autonomic Zero-Knowledge Security Provisioning Model for Medical Control Systems in Fog Computing Environments
Submitted by grigby1 on Fri, 10/26/2018 - 3:46pm
mobile computing
healthcare facilities
healthcare information system environment
high-profile attacks
medical control systems
medical data
medical devices
medical information systems
Medical services
healthcare cloud-lets
mobile services
Protocols
pubcrawl
Resiliency
Scalability
security
security of data
Service Provisioning
edge computing
autonomic zero-knowledge security provisioning model
AZSPM
Cloud Computing
cloud-based solutions
cloud-hoarding
Computational modeling
cyber security
different healthcare enterprises
atomic security components
Fog computing
FOG computing environment
fog environments
fog security administration
fully sand boxed environment
health care
health informatics industry
Health Information Systems