Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Resistance
biblio
A Fuzzy String Matching Scheme Resistant to Statistical Attack
Submitted by aekwall on Mon, 01/18/2021 - 11:35am
Indexes
vector index
string matching
statistical attack
secure fuzzy query
Scalability
S-BF
Resistance
Resiliency
query processing
pubcrawl
noise vector
Metrics
Bloom filter
fuzzy string matching scheme
fuzzy set theory
fuzzy query scheme
Fuzzy Query
Fuzzy Cryptography
frequency distribution
encryption
Encrypted Cloud Database
data structures
Cryptography
Cloud Computing
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 12:44pm
Weight measurement
sybils
Proof-of-work
permissionless systems
perfect peer-sampling service
HAPS
epidemic protocols
decentralized systems
Byzantine-tolerant peer-sampling service
Byzantine fault-tolerant protocols
Blockchain mechanisms
address-based peer sampling service
proof-of-stake
distributed ledgers
Resistance
Protocols
open systems
malicious attacks
Topology
Probabilistic logic
Distributed databases
cryptocurrencies
fault tolerant computing
standards
Metrics
Peer-to-peer computing
sybil attacks
composability
pubcrawl
Resiliency
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 11:23am
heterogeneous networked society
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
3D PAKE protocol
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
security threats
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
computer network security
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
biblio
Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain
Submitted by grigby1 on Mon, 11/02/2020 - 12:30pm
industrial property
time interval
Servers
secure time-stamping schemes
Resistance
Resiliency
resilience
pubcrawl
policy-based governance
patents
patentable ideas
intellectual property systems
intellectual property security
bitcoin
file protection
earliest creation time
digital investigations
digital files
Cryptography
composability
Cloud Computing
Chronos
chain quality
blockchain-based time-stamping scheme
blockchain-based storage
blockchain
biblio
Development of Models in Resilient Computing
Submitted by grigby1 on Tue, 10/06/2020 - 1:40pm
Resistance
parallel processing
Perturbation methods
perturbations
problem solving
pubcrawl
resilience
Resiliency
resilient computing
modelling
resistive computing
resistivity
resource boundaries
resource niche
reversible and irreversible processes
reversible development processes
smarter elasticity
elastic computing
checkability
Circuit faults
computational checkability
Computational modeling
computing development
computing evolution factors
Computing Theory
critical applications
Biological system modeling
elasticity
evolutionary computation
evolutionary development
fuzzy set theory
growth challenge
harsh resistance
irreversible development processes
biblio
Creation of Adversarial Examples with Keeping High Visual Performance
Submitted by grigby1 on Fri, 09/11/2020 - 11:46am
visualization
intelligence
image recognition technology
human readability
high visual performance
FGSM
convolutional neural network (CNN)
character string CAPTCHA
character recognition
character images
artificial
CAPTCHA
captchas
image recognition
convolutional neural network
learning (artificial intelligence)
adversarial examples
image classification
Resistance
Perturbation methods
composability
Mathematical model
security
Human behavior
pubcrawl
Neural networks
convolutional neural nets
CNN
machine learning
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 12:41pm
Dynamic Differential Logic
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
combinational cells
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
power consumption
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
private key cryptography
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
biblio
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing
Submitted by aekwall on Mon, 07/20/2020 - 10:45am
box times
white box cryptography
white-box Ramsey problem
white-box model
white-box hardness
white-box complexity
the Ramsey problem
TFNP problems
succinct black-box
Ramsey theory
hard property
graph size
graph property testing
description size
collision-resistant hashing
Resiliency
black-box hardness
black-box complexity
search problems
Resistance
Integrated circuit modeling
pubcrawl
Complexity theory
computational complexity
testing
Metrics
Computational modeling
Cryptography
graph theory
composability
biblio
CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Submitted by aekwall on Mon, 07/20/2020 - 10:43am
radar detection
Resistance
controller area networks
automotive networks
broadcast medium
CAN radar networks
Distance measurement
Impedance measurement
malicious message transmission
Transmission line measurements
radar receivers
Resistors
sensing unit
TDR technique
time domain reflectometry technique
time-domain reflectometry
transceivers
vehicle network
sensors
IDS
Internet of Things
cyber-physical systems
Resiliency
pubcrawl
Anomaly Detection
security vulnerabilities
security mechanisms
Intrusion Detection
Intrusion Detection Systems
protocol
automotive security
controller area network
controller area network security
Impedance
power transmission lines
biblio
A Modeling Attack Resistant Deception Technique for Securing PUF based Authentication
Submitted by grigby1 on Fri, 06/19/2020 - 11:49am
mutual authentication
Servers
Scalability
resource-rich server authentication
Resistance
Resiliency
resilience
replay attacks
Registers
PUF-based authentication method
pubcrawl
Protocols
Policy-Governed Secure Collaboration
policy-based governance
physical unclonable function-based authentication protocol
physical unclonable function (PUF)
active deception protocol
Multiplexing
ML attack
machine learning attacks
learning (artificial intelligence)
Generators
false trust
false PUF multiplexing
Cryptographic Protocols
challenge response pairs
Buildings
binary channel
authentication protocol
authentication
authentic CRP
attack resistant deception technique
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
next ›
last »