Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
C language
biblio
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
Submitted by aekwall on Thu, 02/02/2023 - 5:37pm
pubcrawl
Resiliency
Human behavior
composability
Manuals
Inspection
static analysis
codes
static code analysis
source coding
C language
empirical study
Manual inspection of alarms
merging
Repositioning of alarms
biblio
A Benchmarking of the Effectiveness of Modular Exponentiation Algorithms using the library GMP in C language
Submitted by aekwall on Mon, 03/22/2021 - 1:13pm
left-to-right square and multiply exponentiation algorithm
word length 1024.0 bit
Scalability
RSA
right-to-left square and multiply exponentiation algorithm
Resiliency
Registers
Public Key Cryptography.
public key cryptography
pubcrawl
multiply left-to-right square and multiply always right-to-left square and multiply always exponentiation algorithm
Montgomery ladder exponentiation algorithm
modular exponentiation algorithms
library GMP
Libraries
theoretical cryptography
left-to-right signed digit square exponentiation algorithm
Joye ladder exponentiation algorithm
Fast Exponentiation Algorithms
exponentiation
cryptology
Cryptography
computational intelligence
Complexity theory
C languages
C language
Benchmark testing
average complexity evaluation exponentiation algorithm
Compositionality
composability
biblio
Biometric System of Access to Information Resources
Submitted by aekwall on Tue, 03/09/2021 - 11:57am
internet
webhost web server
web resource
unauthorized access
structural schematic diagram
software and hardware complex
Scalability
Resiliency
pubcrawl
phpMyAdmin database server
PHP scripting language
personal data
online front-ends
Metrics
JavaScript
Java
biometric encryption
information resourses
information resources
information resource
Identification
hypermedia markup languages
HTML hypertext markup language
hardware complex
Google Chrome extension
fingerprint
embedded scripts
developed complex
C language
biometric system
authorisation
authoring languages
biblio
An Empirical Study on API-Misuse Bugs in Open-Source C Programs
Submitted by grigby1 on Fri, 08/14/2020 - 11:44am
C language
API misuse
API-misuse bugs
API-misuse detection
API-misuse detectors
APIMU4C
benchmark
bug detection
C code
application programming interfaces
empirical study
fix patterns
Open Source Software
open-source C programs
static analysis detectors
usage statistics
application programming interface
security of data
Detectors
Compositionality
public domain software
security vulnerabilities
Computer bugs
application program interfaces
APIs
program diagnostics
program debugging
static analysis
Libraries
Benchmark testing
Resiliency
resilience
pubcrawl
biblio
An RNS Implementation of the Elliptic Curve Cryptography for IoT Security
Submitted by grigby1 on Fri, 06/26/2020 - 12:54pm
IoT security
Xilinx platform studio tool
Virtex-5 xc5vfx70t device based platform
Software
secure data transaction
Scalability
RNS implementation
Resiliency
resilience
residue number systems
residue number system (RNS)
residue number system
public key cryptography
pubcrawl
Metrics
IoT Security.
C language
Internet of Things
hardware-software codesign implementation
hardware-software codesign
Hardware software codesign
Hardware
Elliptic curves
Elliptic curve cryptography (ECC)
Elliptic curve cryptography
ECC cipher
digital signatures
digital signature
compute-intensive components
Communication Systems
Ciphers
biblio
Scalable Verification Framework for C Program
Submitted by grigby1 on Fri, 06/28/2019 - 10:36am
scalability issues
property-guided program slicing
pubcrawl
quality assurance
resilience
Resiliency
Safety
safety critical areas
Scalability
program verification problem
scalable verification
scalable verification framework
Software
Software systems
structural abstraction
Through-silicon vias
TSV
abstraction refinement
program verification
Program slicing
program compilers
optimization
model checking
Metrics
memory consumption
lines-of-code
extended structural abstraction
context aware software verification
Compositionality
Complexity theory
C program verifiers
C language
automatic software verification framework
biblio
Using TLA+ in the Development of a Safety-Critical Fault-Tolerant Middleware
Submitted by grigby1 on Tue, 02/06/2018 - 1:58pm
safety-critical software
railway safety
railways
Redundancy
Resiliency
safety integrity level 4
safety-critical fault-tolerant middleware
safety-critical industries
safety-critical modules
railway control applications
Software Architecture
software fault tolerance
software quality
software quality metrics
TAS Control Platform
TLA+
trusted platform modules
formal methods
C code
C language
Code Generation
complex algorithms
composability
distributed algorithms
Fault tolerant systems
fault-tolerant distributed algorithms
Algorithm design and analysis
Formal Specification
formal verification
middleware
model checking
property-driven design
pubcrawl
rail traffic control
biblio
Bluetooth technology: ApXLglevel end-to-end security
Submitted by BrandonB on Mon, 05/04/2015 - 1:22pm
NIST Guide
encryption
file transfer
framework compatibility
framework reliability
Indexes
Java
Java language
Mobile communication
mobile phone
MS-Windows 7 operating system
music streaming
embedded appliances
operating system
operating systems (computers)
PAN
personal area network
personal area networks
privacy concern
programming languages
Satellites
security concern
smart phones
strong mutual authentication
communication technologies
ANSI C language
application-layer framework
ApXLglevel end-to-end security
audio streaming
authentication
authorisation
Binary Payload
Bluetooth
Bluetooth security specification
Bluetooth technology
C language
Android operating system
computer network reliability
computer network security
computing technologies
confidentiality
configurable add-on devices
cryptographic service providers
Cryptography
customizable add-on devices
data confidentiality
data integrity
biblio
A new tool for lightweight encryption on android
Submitted by BrandonB on Mon, 05/04/2015 - 1:07pm
information security risk
Throughput
SUN JCE cryptographic provider
stream ciphers
standards
smart phones
PBKDF2 password based key generation method
PBKDF2
password based authentication
NCRYPT application
mobile device
lightweight encryption scheme
Lightweight Encryption
JNI
Java native interface
AES encryption scheme
information security
HummingBird2
Hummingbird-2 scheme
encryption
DES encryption scheme
Cryptography
cryptographic key
cryptographic algorithms
confidential data
Ciphers
C language
block ciphers
Android platform
android
biblio
Pinocchio: Nearly Practical Verifiable Computation
Submitted by Heather Lucas on Wed, 09/17/2014 - 6:34pm
base protocol
C language
correctness verification
cryptographic assumptions
Cryptographic Protocols
end-to-end toolchain
formal verification
general-purpose system
Pinocchio
program compilers
public evaluation key
public key cryptography
public verification key
verifiable computation protocol
zero-knowledge proofs