Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
mesh topology
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
biblio
Design and analysis of a mesh-based Adaptive Wireless Network-on Chips Architecture With Irregular Network Routing
Submitted by aekwall on Mon, 05/11/2020 - 11:09am
network-on-chip
Wires
Wireless Router
Wireless Network-on Chip
wireless network
Wireless communication
wireless channels
token sharing arrangement
Telephone sets
telecommunication traffic
Scalability
Resiliency
remote Network-on-Chip
remote information transmission
pubcrawl
Benchmark testing
Network-on Chip structures
network routing
network on chip security
MulticoreArchitecture
Metrics
metallic interface
mesh-based adaptive Wireless Network-on chips architecture
mesh topology
irregular Network routing
gainful remote handsets
core messages
computer architecture
Communication system security
biblio
Hardware Security Threats Against Bluetooth Mesh Networks
Submitted by aekwall on Wed, 01/16/2019 - 2:05pm
hardware security threats
wireless mesh networks
smartphone platforms
security protocol
resilience
pubcrawl
physical attacks
network topology
Metrics
mesh topology
Mesh networks
Internet of Things
authentication
Hardware Security
encryption
Cryptographic Protocols
composability
Bluetooth special interest group
Bluetooth mesh networks
Bluetooth mesh
bluetooth low energy
Bluetooth
BLE technology
BLE networks