Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
integrity
biblio
IoT Boot Integrity Measuring and Reporting
Submitted by aekwall on Mon, 03/11/2019 - 9:37am
security
IoT
attestation
Resiliency
pubcrawl
composability
integrity
measured boot
trusted platform
Trusted Platfrom Modules
biblio
Security Analysis of Vehicular Ad-hoc Networks based on Attack Tree
Submitted by grigby1 on Mon, 01/21/2019 - 11:31am
tree structure
private information
pubcrawl
Resiliency
security
Security analysis
security threat
smart cities
telecommunication security
privacy
trees (mathematics)
VANET
vehicle network
vehicles
vehicular ad hoc network
vehicular ad hoc networks
vehicular ad-hoc networks
Ad Hoc Network Security
open access environment
Metrics
Logic gates
integrity
information discreet
important security requirements
data privacy
confidentiality
confidential information
Conferences
Computers
Compositionality
Availability
attack-defense tree
attack tree
biblio
Security in Personal Genomics: Lest We Forget
Submitted by grigby1 on Fri, 09/28/2018 - 2:12pm
resilience
pubcrawl
Scalability
integrity
authenticity
digital signatures
authenticated data structures
digital signature chaining
genomic security
biblio
FADETPM: Novel approach of file assured deletion based on trusted platform module
Submitted by grigby1 on Wed, 09/12/2018 - 10:18am
Scalability
Handheld computers
integrity
internet
Memory
offline data storage
outsourced data files
privacy
pubcrawl
File Assured Deletion
SSP
storage management
storage service provider
tpm
Trusted Computing
Trusted Platform Module
VANISH
Business
file access policies
FADETPM
FADE
Ephemerizer
data privacy
data integrity
data deletion
Cryptography
cryptographic issues
computer storage space
computer storage management
computer security
cloud storage
Cloud Computing
business risk
biblio
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree
Submitted by grigby1 on Thu, 08/23/2018 - 10:57am
Merkle history tree
Chameleon hash
chameleon hashing
concurrent authenticated tree
Concurrent Authentication
concurrent large-scale log streams
cryptographic hashing
discrete log
highly concurrent scale log streams
large-scale distributed applications
large-scale distributed systems
log data
log management tools
logarithmic number
Cats
Merkle-tree approach
providing security
public verifiability
resource-constrained systems
secure audit logging schemes
Secure logging
secure logging system
security community
space-efficiency
tamper-evident logging
tree data structures
untrusted machine
History
Concurrency
cyber-physical systems
pubcrawl
composability
Cryptography
system monitoring
distributed processing
Servers
authentication
Analytical models
tools
data structure
data structures
security
resilience
data integrity
Metrics
program verification
Resiliency
forward security
integrity verification
digital signatures
distributed system
integrity
concurrency control
audit logs
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 2:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
biblio
Data Security and Confidentiality in Public Cloud Storage by Extended QP Protocol
Submitted by grigby1 on Thu, 05/24/2018 - 11:24am
public cloud storage
internet
outsourcing
outsourcing protocol
Policy
privacy
Privacy Policies
Protocols
pubcrawl
integrity
QP Protocol
Quadratic programming
Scalability
secure outsourcing
secure protocol
security of data
storage management
clients cloud provider
information technology
Human behavior
encryption
data storage
data security correctness
data privacy
data confidentiality
confidentiality
computer user
computer system
cloud technology
cloud computing technology
cloud computing data storage technology
Cloud Computing
cloud access
biblio
Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage
Submitted by K_Hooper on Wed, 05/09/2018 - 9:56am
outsourcing data services
security shortage
security problems
Security Audits
Security analysis
Secure storage
secure cloud storage
Scalability
Resiliency
Public key
public integrity auditing
public auditing scheme
public auditing
pubcrawl
Privacy-preserving
Cloud Computing
outsourcing
Mathematical model
low computational audit cost
integrity
Human behavior
Forgery
dynamic-hash-table based public auditing
dynamic hash table
dynamic data
data structure DHT
data blocks
Cryptography
cryptanalysis
countermeasures
biblio
Evaluation of a Formalized Encryption Library for Safety-Critical Embedded Systems
Submitted by grigby1 on Tue, 02/27/2018 - 1:28pm
safety leveraged implementation of data encryptio
optimisation
optimization
programming languages
pubcrawl
public key cryptography
public-key based encryption
resilience
Resiliency
resource restricted embedded safety devices
Safety
model based language
safety leveraged implementation of data encryption
safety-critical embedded systems
safety-critical infrastructure
safety-critical software
Scade
security architecture multiple independent levels
SLIDE library
Software
synchronous dataflow language optimization
train control safety application
embedded systems
authentication
complex safety-critical devices
composability
confidentiality
Cryptographic Protocols
cryptography implementations
data integrity
demilitarized zones
dependable communication
diverse integration patterns
Air gaps
encrypting gateways
encryption
formalized encryption library evaluation
Human behavior
Human Factors
infamous air gap
integrity
Libraries
Metrics
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
« first
‹ previous
1
2
3
4
5
6
next ›
last »