Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
resource constraints
biblio
Constant Size CP-ABE with Scalable Revocation for Resource-Constrained IoT Devices
Submitted by grigby1 on Fri, 07/24/2020 - 11:40am
Internet of Things
valid users
scalable revocation
Scalability
resource-constrained IoT devices
resource constraints
related schemes
pubcrawl
portable devices
policy-based governance
mobile-based selective sharing
mobile computing
malicious users
IoT
Internet of Things device
authorisation
Cryptography
CP-ABE
constant size CP-ABE
constant number
constant ciphertext length CP-ABE scheme
constant ciphertext
constant cipher-text
collaboration
ciphertext-policy attribute encryption scheme
chosen ciphertext attack secure
CCA-secure
CCA secure proxy-based scalable revocation
C-PROSRCC scheme
biblio
New Approach to Secure Cluster Heads in Wireless Sensor Networks
Submitted by aekwall on Mon, 02/17/2020 - 1:34pm
inter-cluster communication
cluster head
resource constraints
Aggregation
Cluster.
cryptographic algorithm
genetic algorithm based search
Head
hierarchical architecture security
malicious attacks
intra-cluster communication
multihop approach
node failure probability
overhead communication
overhead computation
secured WSN deployment
wireless links
Wireless Sensor Network
Metrics
telecommunication security
security
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
sensor nodes
Monitoring
Clustering algorithms
probability
genetic algorithms
security threats
sensor security
Topology
data aggregation
biblio
Extracting Side-Channel Leakage from Round Unrolled Implementations of Lightweight Ciphers
Submitted by aekwall on Mon, 01/20/2020 - 10:59am
side channel analysis attacks
narrow bandpass filtering
optimal leakage models
parallel round-based datapath
PRINCE
pubcrawl
Resiliency
resource constraints
round unrolled implementations
round unrolling
Scalability
side channel analysis
multiband narrow bandpass filtering techniques
side channel signatures
side-channel leakage
signal isolation
Signal to noise ratio
signal-to-noise ratio
SIMON
SIMON datapaths
size 45.0 nm
SNR
time domain correlation power analysis
Energy Efficiency
AES
AES algorithm
Band-pass filters
Ciphers
combinational logics
Correlation
correlation frequency analysis
Cryptography
edge nodes
encryption
advanced encryption standard
field programmable gate arrays
Filtering
first-order side-channel leakages
FPGA
fully-unrolled datapath
Hardware
improved CFA attack
leakage models
Lightweight Ciphers
lightweight cryptographic algorithms
file
Extracting time-critical situational awareness from resource constrained networks
Submitted by Amit Roy Chowdhury on Fri, 01/10/2020 - 3:38pm. Contributors:
Amit Roy Chowdhury
Srikanth V. Krishnamurthy
Eamonn Keogh
video analytics
resource constraints
Multi-modal data analysis
summarization
Posters
1544969
CPS PI Meeting 2019
2019
NSF
U.S. Government
Poster