Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption
biblio
Security of sharded NoSQL databases: A comparative analysis
Submitted by BrandonB on Fri, 05/01/2015 - 8:30am
encryption
SQL
Sharding
sharded NoSQL databases
Servers
security of data
security features
NoSQL sharding mechanisms
NoSQL
Access Control
Distributed databases
Database Security
Data and Applications Security
Comparative Analysis
BASE
authentication
assessment criterion
biblio
Error value driven fault analysis attack
Submitted by BrandonB on Fri, 05/01/2015 - 7:56am
advanced encryption standard
AES
Ciphers
Circuit faults
cryptographic circuits
Cryptography
encryption
Equations
Error value
error value driven fault analysis attack method
Fault analysis attacks
field programmable gate arrays
Side-channel attack
standards
Tamper resistance
biblio
A privacy-aware query authentication index for database outsourcing
Submitted by BrandonB on Thu, 04/30/2015 - 2:34pm
encryption
visual databases
verification object transmission overhead
unsophisticated data grouping strategy
Spatial databases
spatial database
spatial data distribution
service provider
range query answering
query result integrity
query processing
privacy-aware query authentication index
periodic function-based data grouping scheme
outsourcing
Indexes
group signature
authentication
Encrypted database
digital signatures
database outsourcing
database management system
database indexing
data storage
Data Security
data privacy
data maintenance
data integrity
data confidentiality
Data authentication index
cost reduction
Cloud Computing
bucket-based data authentication methods
biblio
Implementing IPsec in Wireless Sensor Networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:26pm
IEEE 802.15.4 networks
Zigbee
WSNs
wireless sensor networks
stand-alone wireless sensor networks
security threats
Payloads
IPv6 enabled sensor networks
IPsec authentication header
IP networks
Internet of Things paradigm
internet
6LoWPAN adaptation layer
IEEE 802.15 Standards
ESP compressed header performance
end-to-end communication path
encryption
encapsulation security payload
E2E security
Cryptography
computer network security
communication endpoints
authentication
AH
biblio
Data security protocol for cloudlet based architecture
Submitted by BrandonB on Thu, 04/30/2015 - 2:20pm
encryption
unauthorized user
security
resource-rich computer
mobile devices
mobile computing
Mobile communication
mobile cloud computing technology
mobile cloud computing
internet
Cloud Computing
distributed cloud architecture
data security protocol
Cryptographic Protocols
Computers
computer architecture
cloudlet based architecture
cloudlet
cloud storage
biblio
Design, implementation and security analysis of Hardware Trojan Threats in FPGA
Submitted by BrandonB on Thu, 04/30/2015 - 1:41pm
integrated circuits
RoT
security
denial of service
design
encryption
field programmable gate arrays
FPGA testbed
Hardware
hardware Trojan detection technique
hardware Trojan threats
Hardware Trojans
HDM
HTT detectability metric
HTT detection
ICs
timing variation
integrated logic circuits
invasive software
missed detection probability
normalized physical parameters
optimal detection threshold
power consumption
Power demand
Resiliency
root of trust
Security analysis
sensitive information leak
summation of false alarm
timing
Trojan taxonomy
Trojan horses
biblio
Security architecture for at-home medical care using Wireless Sensor Network
Submitted by BrandonB on Thu, 04/30/2015 - 12:46pm
low-energy secure data transmission
wireless sensor networks
vital health parameter continuous monitoring
Servers
sensors
security architecture
security
patient monitoring
MWSN
medical wireless sensor network
Medical services
medical data sensors
at-home medical care
hospitals
hospital wireless networks
healthcare industries
health care
encryption
distributed wireless sensor network technologies
Data Transmission
Cryptography
compressed sensing-encryption
compressed sensing
body sensor networks
biblio
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
Submitted by rvmeush on Fri, 09/26/2014 - 1:03pm
privacy
Web sites
Web site identification
Web pages
Vectors
upstream bandwidth
traffic morphing scheme
traffic analysis countermeasures
traffic analysis attack
TLS
telecommunication traffic
TA attack
Support vector machines
SSH
security
Accuracy
padding
machine learning
IPsec
hypermedia
HTTP traffic
general-purpose TA countermeasures
encryption
encrypted tunnel
encrypted traffic
downstream bandwidth
Cryptography
Bandwidth
attack/countermeasure pairings
biblio
Memory Trace Oblivious Program Execution
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:46pm
Oblivious RAM
variable partitioning
type system
Semantics
Random access memory
programming language techniques
program verification
program diagnostics
program compilers
probing memory buses
physical control
physical attacks
physical access
ORAM banks
optimal efficiency
arrays
memory trace oblivious program execution
memory access traces
memory access overhead
formal security
encryption
DRAM chips
Cryptography
computing platform
computing infrastructure
compiler
cold-boot style attacks
cloud service providers
Cloud Computing
« first
‹ previous
…
103
104
105
106
107
108
109
110
111