Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Internet of Things
biblio
OLYMPUS: A distributed privacy-preserving identity management system
Submitted by grigby1 on Mon, 03/29/2021 - 2:24pm
Internet of Things
service providers
security
Scalability
Resiliency
resilience
pubcrawl
Privacy-preserving
privacy enhancing technologies
privacy
OLYMPUS H2020 EU project
IoT
blanket surveillance
identity providers
Identity management
Human behavior
GDPR
distributed privacy-preserving identity management system
digital identities
data privacy
cybercrimes
Cryptography
computer network security
Computer crime
biblio
Identity-of-Things Model using Composite Identity on Permissioned Blockchain Network
Submitted by grigby1 on Mon, 03/29/2021 - 2:23pm
pubcrawl
Identity-of-Things approach
Identity-of-Things model
Internet of Things
Internet-of-Things technology
IoT devices
permissioned blockchain
permissioned blockchain implementation
Permissioned blockchain Network
Identity-of-Things (IDoT)
resilience
Resiliency
rogue devices
Scalability
smart contract
Software
tamper-proof identity
telecommunication security
distributed identity management model
authorisation
collaborative participation
composite identity
contracts
Cryptography
data privacy
device domains
Distributed databases
Access Control
Focusing
growing prevalence
heterogeneous smart applications
Human behavior
Identity management
identity spoofing
identity storage
biblio
Human-centric Software Engineering for Next Generation Cloud- and Edge-based Smart Living Applications
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Smart homes
Intelligent sensors
Internet of Things
next generation cloud
next-generation applications
privacy
Privacy Requirements
pubcrawl
Scalability
smart cities
smart city-related data
human-centric software engineering
smart living systems
Software
software activities
software development
software engineering
software requirements engineering
user centred design
user interfaces
visualization
edge computing applications
Cloud Computing
data analysis
data analysis applications
data privacy
data visualisation
diverse software usability defects
diversity and inclusion
domain-specific visual models
edge computing
aging
edge-based smart living applications
edge-based software systems
end user emotions
expert systems
Formal Specification
human computer interaction
Human Factors
human usage patterns
human-centric security
biblio
Improved Secure Internet of Things System using Web Services and Low Power Single-board Computers
Submitted by grigby1 on Mon, 03/29/2021 - 1:16pm
Internet of Things system
Web-based communication
web services
single-board computers
single board computers
service-oriented architecture
sensors
security vulnerabilities
security
Scalability
pubcrawl
privacy
microcomputers
message authentication
IoT system
IoT architecture
authentication
Internet of Things security
Internet of Things
Human Factors
expert systems
data privacy
data integrity
data confidentiality
data availability
cyber security
Cryptography
Computers
computer architecture
authorization
authorisation
biblio
Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach
Submitted by grigby1 on Mon, 03/29/2021 - 1:14pm
remote patient monitoring
Medical services
patient care
patient monitoring
patients care
Peer-to-peer computing
privacy
private medical data
pubcrawl
medical information systems
Safety
safety mechanism
Scalability
security
Skin
skincare monitoring
telemedicine
health care
cloud
Cloud Computing
Cryptography
Data protection
Data Transmission
distributed architecture
Distributed databases
expert systems
blockchain
Human Factors
Internet of Things
IoT based skin monitoring system
IoT based skin surveillance system
IoT devices
IoT monitoring
medical care
biblio
Tree-Chain: A Fast Lightweight Consensus Algorithm for IoT Applications
Submitted by aekwall on Mon, 03/29/2021 - 12:08pm
Hash functions
unique ledger
tree-chain
scalable fast blockchain instantiation
parallel chain branches
nonmonetary applications
high transaction delays
hash function output
fast lightweight consensus algorithm
consensus code
Consensus algorithm
computationally expensive validator selection
hash algorithms
Cryptography
Compositionality
Public key
Throughput
pubcrawl
delays
trees (mathematics)
blockchain
Resiliency
IoT applications
Internet of Things (IoT)
security
Internet of Things
biblio
Research on Technology of Embedded System Security Protection Component
Submitted by grigby1 on Mon, 03/29/2021 - 12:03pm
log management
whitelist-based security protection
whitelist management
trusted computing technology
Trusted Computing
transport protocols
TCPIP
TCP/IP protocol
security policy management
security management system
security management
Resiliency
resilience
Qt graphical management interface
pubcrawl
Metrics
composability
Kernel
IoT devices
Internet of Things development
Internet of Things
graphical management interface
embedded systems
embedded system security protection
embedded security protection system
Cryptography
cryptographic algorithm
Computers
computer network security
computer network reliability
computer network performance evaluation
computer network management
biblio
Towards Security Attack and Risk Assessment during Early System Design
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
pubcrawl
task mappings
system designers
smart devices
security vulnerabilities
security risk
security constraints
security attackers
security attack
Secure IoT Systems
Secure Embedded Consumer Devices
risk assessment
Resiliency
resilience
composability
Metrics
IoT devices
Internet of Things
embedded systems
Embedded System Design
design space exploration tools
Design Space Exploration
cybersecurity attacks
cyber-physical systems
cyber security
CPS
computer network security
biblio
Hardware Security Vulnerability Assessment to Identify the Potential Risks in A Critical Embedded Application
Submitted by grigby1 on Mon, 03/29/2021 - 12:02pm
microcontrollers
similar MCU-based applications
security risks
security of data
security challenges
secure embedded IoT applications
safety-critical software
safety-critical applications
resilient applications
Resiliency
resilience
pubcrawl
power system security
physical attacks
patient care
composability
Metrics
Internet of Things (IoT)
Internet of Things
hardware security vulnerability assessment
hardware security assessment approach
Hardware Security
fault injection attacks
fault injection attack
Fault Attacks
embedded systems
embedded software developers
Detection and Mitigation
critical medical IoT device
critical embedded application
biblio
Research of MQTT, CoAP, HTTP and XMPP IoT Communication protocols for Embedded Systems
Submitted by grigby1 on Mon, 03/29/2021 - 11:57am
Metrics
XMPP IoT communication protocols
XMPP
transport protocols
Software
security
Resiliency
resilience
pubcrawl
Protocols
protocol
Power demand
popular IoT protocols
MQTT
advantage
IoT protocol
IoT
Internet of Things
HTTP
hardware stage
Hardware
Esp32
embedded systems
Embedded System
different IoT protocols
composability
CoAP
« first
‹ previous
…
35
36
37
38
39
40
41
42
43
…
next ›
last »