Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
security applications
biblio
Hardware Implementation of Cancellable Biometric Systems
Submitted by aekwall on Tue, 03/09/2021 - 11:56am
FPGA model
Watermarking
Three-dimensional displays
security systems
security applications
Scalability
Resiliency
pubcrawl
one-way cancellable biometric template system
Metrics
Information encryption
Hardware Implementation
Hardware
biometric encryption
FPGA
fingerprint encryption
field programmable gate arrays
face encryption
encryption
Cryptography
Cancellable biometrics
biometrics (access control)
Biological system modeling
3D chaotic mapping
3D chaotic map
biblio
Hardware implementation of Piccolo Encryption Algorithm for constrained RFID application
Submitted by aekwall on Mon, 02/10/2020 - 11:44am
piccolo encryption algorithm
4 input LUTs
64 bits block size
area optimization
ASIC
constrained RFID application
different design strategies
efficient hardware architecture
Fiestel structure
hardware design
hardware metrics
low resource applications
optimized area
Piccolo Algorithm
128 bits
piccolo lightweight algorithm
radiofrequency identification
relevant lightweight block ciphers
severe security concerns
supports high speed
Throughput.
tremendous pace
ultra-lightweight applications
variable key size
word length 64.0 bit
word length 80.0 bit
Xillinx
Microelectronics Security
security applications
field programmable gate arrays
FPGA
Cryptography
encryption
Internet of Things
telecommunication security
Hardware
Table lookup
IoT applications
smart devices
Resiliency
pubcrawl
composability
IoT
RFID
Throughput
Ciphers
security issues
Predictive Metrics
private information
word length 128.0 bit
Hardware Implementation
hardware resources
lightweight cryptographic algorithms
S-box
lightweight cryptography
biblio
A Machine Learning Attacks Resistant Two Stage Physical Unclonable Functions Design
Submitted by grigby1 on Mon, 06/10/2019 - 1:55pm
mirrors
Transistors
traditional approaches
stage physical unclonable functions design
security of data
security applications
security
Resiliency
resilience
Reliability
PUF
pubcrawl
privacy
physical unclonable function (PUF)
modelling attacks
32-bit current mirror
Mathematical model
machine learning attacks
machine learning
lightweight electronics
learning (artificial intelligence)
Hash functions
enhancing security
Current Mirror PUF
Cryptography
composability
CMOS integrated circuits
asynchronous circuits
Arbiter-PUF
65nm CMOS technology
biblio
CPS-MT: A Real-Time Cyber-Physical System Monitoring Tool for Security Research
Submitted by aekwall on Wed, 05/01/2019 - 12:41pm
monitoring systems
tools
Servers
security research
security of data
security applications
security
Resiliency
real-time systems
real-time cyber-physical system monitoring tool
real-time CPS monitoring tool
real-time constraints
Real time monitoring
publicly available monitoring tools
pubcrawl
physical phenomena
Human Behavior and Cybersecurity
Monitoring
MiniCPS-based case study
Metrics
Industrial Control Systems
human computer interaction
embedded systems
Cybersecurity
cyber-physical systems
cyber physical systems
CPS-MT
CPS simulations
computerised monitoring
computer architecture
composability
Human behavior
biblio
Random Number Generator Based on Hydrogen Gas Sensor for Security Applications
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
petrochemical field
hydrogen gas sensor
II-VI semiconductor materials
microfabrication
microfabrication techniques
nanowires
NIST 800-22 statistical randomness test
nondeterministic noise
nuclear reactors
Hydrogen
random number generation
random number generator
security applications
security of industry applications
thermal noise
thermal noise information
Zinc oxide
sensor security
cryptographic applications
Resiliency
Human behavior
pubcrawl
composability
Metrics
Entropy
Generators
statistical analysis
Cryptography
entropy source
fuel cells
Gas detectors
gas sensor based RNG
gas sensors
hash function SHA-256
high-quality random number generator
biblio
An object-oriented open software architecture for security applications
Submitted by grigby1 on Thu, 06/07/2018 - 3:01pm
public key cryptography
Universal Serial Bus
Software Architecture
Software
smart cards
security of data
security device
security applications
security APIs
security
secure messaging
secure communication
SEcube™ platform
Resiliency
resilience
application program interfaces
pubcrawl
Pins
Open Hardware security platform
object-oriented open software architecture
object oriented security
multiplatform Open Source security framework
Metrics
Libraries
Hardware
field programmable gate arrays
dedicated Open Hardware devices
Data protection
CPU
composability
biblio
Towards accessible mobile pattern authentication for persons with visual impairments
Submitted by grigby1 on Thu, 06/07/2018 - 2:58pm
smart phones
pattern locks
pressure gradient input
pubcrawl
resilience
Resiliency
Scalability
security
security applications
pattern lock
smartphone
Smartphones
touch sensitivity
usage scenario
user interface related issues
user preferred color combination
visual impairments
Visually Impaired
graphical user interfaces
accessible mobile pattern authentication
accessible security application
Android users
authentication
authentication strength
authorisation
color blind users
complex design
access barrier
handicapped aids
Human behavior
Image color analysis
inaccessible design
Mobile communication
mobile computing
mobile locks
password
biblio
Analysis of wavelet, ridgelet, curvelet and bandelet transforms for QR code based image steganography
Submitted by grigby1 on Tue, 01/23/2018 - 2:59pm
pubcrawl
wavelet transforms
wavelet transform
transform coefficients
transform based image steganography
Steganography
security applications
security
secret message
ridgelet transform
Resiliency
QR codes
QR code based image steganography
bandelet transform
information security
Image Processing
Image coding
frequency-domain analysis
discrete wavelet transforms
discrete cosine transforms
cyber physical systems
curvelet transforms
curvelet transform and bandelet transform
curvelet transform
Cryptography
bit-plane based steganography method
biblio
RFID integrated QR code tag antenna
Submitted by grigby1 on Wed, 03/08/2017 - 2:29pm
QR code tag antenna
UHF antennas
telecommunication security
tag
supply-chain management
security applications
RFID tag antenna design
RFID
Resonant frequency
radiofrequency identification
quick response code
QR codes
antenna
QR code
pubcrawl170112
microstrip antennas
ISM frequency band
frequency 2.45 GHz
Electronic mail
data communication
bar code antenna
antennas
Antenna measurements
biblio
A new X-ray backscatter technology for aviation security applications
Submitted by grigby1 on Wed, 03/08/2017 - 2:24pm
suspicious object detection
non-intrusive imaging
object detection
one-sided access method
packet parcel
pubcrawl170112
security applications
sensor arrays
supply chain security
National security
threat detection accuracy
twisted-slit collimator
X-ray backscatter camera
X-ray backscatter image enhancement
X-ray backscatter imaging
X-ray backscatter technology
X-ray detection
X-ray imaging
digital radiography
Airports
aviation security applications
avionics
backscatter
Cameras
collimators
detection of dangerous materials
Detectors
air safety
explosive detection
explosive simulants
high-resolution digital detector arrays
Inspection
luggage
luggage inspection
mock-up dangerous materials
1
2
next ›
last »