Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Applied cryptography
file
Energy-harvested Security for the Internet of Things
Submitted by schaum on Thu, 10/10/2019 - 4:29pm. Contributors:
Patrick Schaumont
Dong Ha
Chao Wang
Posters
Applied cryptography
cyber-physical systems
Hardware Security Architecture
1704176
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
CAREER: Lightweight and Fast Authentication for Internet of Things
Submitted by attilaayavuz on Thu, 10/10/2019 - 4:29pm. Contributor:
Attila Yavuz
Posters
Applied cryptography
Applied Privacy
Cryptography (Theory)
Privacy (Theory)
wireless networking
1652389
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
profile
Attila Yavuz
Defense
Applied cryptography
biblio
Source Attribution of Cryptographic API Misuse in Android Applications
Submitted by grigby1 on Thu, 01/31/2019 - 12:16pm
android
android encryption
Applied cryptography
cryptography apis
Human behavior
Human Factors
Metrics
pubcrawl
resilience
Resiliency
Scalability
source attribution
static analysis
biblio
When Smart TV Meets CRN: Privacy-Preserving Fine-Grained Spectrum Access
Submitted by grigby1 on Mon, 03/05/2018 - 1:07pm
spectrum database controller
resilience
Resiliency
resource management
Scalability
SDC server
secondary spectrum reuse
secondary users
secondary WiFi transmission
set-top boxes
smart TV
spectrum allocation decision process
radio spectrum management
television transmitters
Transmitters
trusted third party
TV
TV receivers
TV transmitters
TV white space model
UHF TV band
white box cryptography
White Box Encryption
wireless LAN
Interference
cognitive radio
composability
CRN
Cryptography
digital television
dynamic spectrum sharing techniques
exclusion zone
high definition television
Homomorphic encryption
idle channels
interactive television
Applied cryptography
IPTV
Metrics
MPC technique
multiparty computation technique
primary TV users
privacy
privacy requirement
Privacy-preserving
privacy-preserving fine-grained spectrum access
pubcrawl
biblio
A Surfeit of SSH Cipher Suites
Submitted by grigby1 on Fri, 09/15/2017 - 11:01am
Applied cryptography
attacks
Lightweight Ciphers
network security
openssh
Protocol Security
pubcrawl
Resiliency
SSH
biblio
A Surfeit of SSH Cipher Suites
Submitted by grigby1 on Tue, 08/22/2017 - 12:07pm
Applied cryptography
attacks
composability
Metrics
network coding
network security
openssh
Protocol Security
pubcrawl
Resiliency
SSH
biblio
Functional Credentials for Internet of Things
Submitted by grigby1 on Fri, 08/18/2017 - 2:13pm
Applied cryptography
digital signatures
functional credentials
Internet of Things
pubcrawl
Resiliency
Scalability
biblio
Elxa: Scalable Privacy-Preserving Plagiarism Detection
Submitted by grigby1 on Tue, 05/30/2017 - 12:56pm
Applied cryptography
collaboration
composability
Human behavior
Metrics
peer to peer security
plagiarism detection
privacy preservation
private record linkage
pubcrawl
Resiliency
Scalability
secure multi-party computation
biblio
"Make Sure DSA Signing Exponentiations Really Are Constant-Time"
Submitted by grigby1 on Wed, 05/17/2017 - 1:52pm
Applied cryptography
cache-timing attacks
CVE-2016-2178
digital signatures
DSA
exponentiation
Human behavior
Kerberos
Metrics
OpenSSL
pubcrawl
Resiliency
side-channel analysis
timing attacks
« first
‹ previous
1
2
3
4
5
6
next ›
last »