Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data integrity
biblio
Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach
Submitted by aekwall on Mon, 02/24/2020 - 10:57am
smart contracts
Repudiation
verifying party
vehicular networks
VANETs
trustworthy nodes
trusted centralized party
smart contract-based approach
reputable trusted node
IPFS
greedy authenticated nodes
computed reputation rating
reputation
MatLab simulation
File systems
digital signatures
traffic engineering computing
trust
Mathematical model
blockchain
Metrics
Peer-to-peer computing
Protocols
composability
pubcrawl
Human behavior
Resiliency
Trusted Computing
security
data integrity
data privacy
biblio
Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack
Submitted by aekwall on Mon, 02/17/2020 - 2:16pm
Smart Grid
smart grid technology
smart electric meter
remote monitoring
electric power companies
data collection Integrity
cyber-attack conditions
cyber attack
smart meter
power meters
Meters
Power demand
cyber physical systems
smart meters
cyberattack
power system security
Smart Grids
power engineering computing
smart grid security
smart power grids
Metrics
privacy
pubcrawl
Resiliency
cyber security
data integrity
Scalability
security of data
biblio
On Integrating Lightweight Encryption in Reconfigurable Scan Networks
Submitted by aekwall on Mon, 01/20/2020 - 12:01pm
RSN
intellectual property
Lightweight Ciphers
lightweight stream cipher
logic testing
maintenance
malicious users
novel hardware
on-chip instrumentation
pubcrawl
PUF
reconfigurable scan networks
Resiliency
integrating lightweight encryption
Scalability
seamless integration
secret keys
Secure Wrapper
self-test
sensitive data
Software
software combined approach
system-on-chip
testing workflow
versatile software toolchain
flexible access
appropriate counter-measures
Ciphers
Cryptographic Protocols
Cryptography
data integrity
data privacy
debug modules
embedded instrumentation
embedded systems
encryption
field programmable gate arrays
-play instrument wrapper
FPGA-based implementation
Hardware
Hardware Security
IEEE standards
IEEE Std 1687
IEEE Std 1687 RSNs
IJTAG
industrial property
instrument wrapper
Instruments
integrated circuit testing
biblio
Information Flow Control for Distributed Trusted Execution Environments
Submitted by aekwall on Mon, 01/20/2020 - 11:45am
encryption
untrusted host
Trusted Computing
TEE
Resiliency
pubcrawl
Protocols
Predictive Metrics
messages authentication
Libraries
information-flow-control
Information Flow Control
high-level abstractions
high-integrity messages
Fabrics
encryption audits
-distributed-systems
distributed trusted execution environments
distributed programming
DFLATE
data integrity
Cryptography
cryptographic mechanisms
core security calculus
confidential messages
Compositionality
Calculus
-trusted-execution-environment
-security
-language-based-security
-enclaves
biblio
Detection of False Data in Wireless Sensor Network Using Hash Chain
Submitted by grigby1 on Mon, 12/30/2019 - 2:22pm
hash chain
WSN
wireless sensor networks
Wireless Sensor Network
telecommunication security
sensor nodes
Resiliency
resilience
pubcrawl
Mathematics
Human behavior
Hostile Environment
authentication
False Data Injection
false data filtering schemes
False Data Detection
encryption
data integrity
cyber physical systems
Cryptography
composability
bogus data
Base stations
biblio
IoT Data Management and Lineage Traceability: A Blockchain-based Solution
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
Internet of Things
untrusted IoT devices
unauthorized access
Trusted Computing
smart contracts
Servers
security threats
pubcrawl
program diagnostics
Privacy Threats
privacy
open systems
lineage traceability
IoT data management
interoperability
Internet of Things (IoT)
Outsourced Database Integrity
fog nodes
edge clouds
Distributed databases
data provenance
data privacy
data management
data integrity
Cryptography
Cloud Computing
blockchain-based data management
blockchain
authorization
Resiliency
composability
Metrics
biblio
Assured Delegation on Data Storage and Computation via Blockchain System
Submitted by aekwall on Mon, 11/25/2019 - 2:12pm
public verifiable delegation
integrity checking
outsourced data
outsourcing
owner authentication
privacy
privacy issues
Proposals
pubcrawl
Distributed databases
remote storage
Servers
smart contracts
transparent public verifiable delegation
untrusted remote data manipulation
user privacy
verifiable computation
verifiable computation problems
cryptographic algorithms
Metrics
composability
Resiliency
API
application program interfaces
blockchain
challenge-response model
Cloud Computing
Outsourced Database Integrity
Cryptography
data integrity
data opening
data privacy
data query security
Data Security
data storage
delegation
biblio
SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query results for Cloud Databases
Submitted by aekwall on Mon, 11/25/2019 - 2:11pm
metadata
Outsourced Database Integrity
trusted authority
secure scheme to provide confidentiality and integrity of query
SCIQ-CD
database service providers
database queries
database outsourcing
Database as a service
data confidentiality
cloud databases
outsourcing
data integrity
database management systems
Cloud Computing
Databases
query processing
Metrics
composability
pubcrawl
Resiliency
Trusted Computing
cloud storage
data privacy
encryption
Cryptography
authorisation
biblio
Blockchain-Based PKI Solutions for IoT
Submitted by aekwall on Mon, 11/18/2019 - 11:48am
public key cryptography
PKI Trust Models
scalable PKI
robust PKI
publicly verifiable trusted third parties
public key certificates
peer-to-peer data store
Ethereum Light Sync client
Ethereum blockchain
Emercoin Name Value Service
decentralized trusted third parties
consensus protocols
certification authority
blockchain-based PKI solutions
blockchain-based alternatives
public key infrastructure
IoT
Public key
smart contracts
blockchain
Metrics
Peer-to-peer computing
bitcoin
pubcrawl
Human behavior
Resiliency
Trusted Computing
Protocols
data integrity
Internet of Things
Scalability
computer network security
biblio
Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat Algorithm
Submitted by aekwall on Mon, 11/04/2019 - 11:22am
mRMR based binary bat algorithm
data protection issues
data tempering attacks
Database-security
deletion attacks
evolutionary computation
evolutionary technique
feature-subset-selection
insertion attacks
data accuracy
mRMR based feature subset selection technique
numerical relational database
relational data
relational database security
reversible watermarking
security protection
watermark creation
security of data
constraints optimization technique
Constraint optimization
binary-bat-algorithm
alteration attacks
relational databases
digital watermarking
Watermarking
Clustering algorithms
Robustness
Metrics
composability
pubcrawl
Human behavior
Resiliency
data integrity
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »