Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
IoT
biblio
A privacy-preserving homomorphic encryption scheme for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 5:36pm
hop-by-hop encryption
smart things
sensors
secure cooperation
secret sharing
Scalability
resource constrained devices
Resiliency
pubcrawl
privacy homomorphism
Metrics
Logic gates
IoT
Internet of Things
Human Factors
Additives
Homomorphic encryption
heterogeneous smart things
fully additive secret sharing
fully additive encryption
end-to-end encryption
encryption
Elliptic curves
elliptic curve
disruptive paradigm
data concealment
data analysis module
Cryptography
context-aware decision mechanisms
ambient environment
biblio
Smart Cyber-physical Systems: Beyond Usable Security to Security Ergonomics by Design
Submitted by grigby1 on Tue, 01/16/2018 - 5:33pm
CPS
cyber-physical systems
HFACS
Human Factors
Internet of Things
IoT
Metrics
Pervasive Computing Security
pubcrawl
Resiliency
Scalability
security ergonomics
biblio
Source-End DDoS Defense in IoT Environments
Submitted by grigby1 on Tue, 01/16/2018 - 5:33pm
DDoS
fast retransmit
Human Factors
Internet-scale Computing Security
IoT
Metrics
network security
Pervasive Computing Security
pubcrawl
Resiliency
Scalability
source-end ddos defense
TCP
biblio
Fending off IoT-hunting Attacks at Home Networks
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
home network
honey pots
honeypot
IoT
Metrics
moving target defense
pubcrawl
Resiliency
Router Systems
security
biblio
Designing a Micro-moving Target IPv6 Defense for the Internet of Things
Submitted by grigby1 on Tue, 01/16/2018 - 5:31pm
Metrics
testing
sensors
Resiliency
Reconnaissance
pubcrawl
Protocols
optimization
moving target defense
micromoving target IPv6 defense
Cooja simulation configuration
Limiting
IP networks
IoT devices
IoT
Internet of Things
internet
hardware testing
embedded systems
cyber security
video
CPS:TTP Option: Synergy: Collaborative Research: Internet of Self-powered Sensors - Towards a Scalable Long-term Condition-based
Submitted by Shantanu Chakraba... on Tue, 01/09/2018 - 1:46pm
Internet of Things
IoT
Michigan State University
University of Nevada Reno
Washington University St Louis
1645783
1646380
1646420
CPS-PI Meeting 2017
biblio
Towards provisioning of SDN/NFV-based security enablers for integrated protection of IoT systems
Submitted by grigby1 on Thu, 12/28/2017 - 12:40pm
Monitoring
Virtualization
standards
software defined networking
security scalability
SDN/NFV-based security features
Scalability
pubcrawl
open-source SDN/NFV projects
authentication
low-cost end-user devices
IoT
Internet of Things
cybersecurity attacks
Conferences
computer network security
Cloud Computing
biblio
Comparative study of two pseudo chaotic number generators for securing the IoT
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
pubcrawl
NIST
nonlinear functions
nonlinear recursive filters
PCNG2
piece-wise linear chaotic map
piecewise linear techniques
PRNGs
pseudo chaotic number generators
network security applications
PWLCmap
random number generation
recursive filters
Resiliency
second pseudo chaotic number generator
Skew Tent map
STmap
generation time
Bit rate
chaotic communication
chaotic cryptography
Ciphers
composability
coupled chaotic maps
cryptographically strong pseudo random number generators
Cryptography
binary diffusion matrix
Generators
Informatics
information security
Internet of Things
IoT
logistic map
Metrics
biblio
One-Round Provably Secure Yoking-Proof for RFID Applications
Submitted by grigby1 on Wed, 12/20/2017 - 12:05pm
privacy protection
yoking-proof
tools
RFIDs
RFID tags
RFID tagged objects
RFID tag pair
RFID applications
RFID
Resiliency
radiofrequency identification
pubcrawl
provable security
authentication
privacy model
privacy
one-round provably secure yoking-proof
one-round offline yoking-proof scheme
Moriyama security model
IoT
Internet of Things
Human Factors
Human behavior
data privacy
Cryptography
biblio
Integration of wireless sensor network and Web of Things: Security perspective
Submitted by grigby1 on Wed, 12/20/2017 - 12:02pm
Logic gates
sensor security
WSN integration
WoT security issue
Web of Things
smart thing
Sensor
security perspective
Security Challenge
Internet of Things vision
WSN
security threats
control systems
wireless sensor networks
Wireless Sensor Network
security
Wireless communication
computer network security
Computer crime
data privacy
Protocols
composability
Internet of Things
Human Factors
Human behavior
Resiliency
pubcrawl
Metrics
IoT
« first
‹ previous
…
42
43
44
45
46
47
48
49
50
…
next ›
last »