Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secret information
biblio
Property Based Formal Security Verification for Hardware Trojan Detection
Submitted by grigby1 on Mon, 11/02/2020 - 12:35pm
Resiliency
invasive software
Logic gates
malicious Hardware Trojans
modern computer hardware
policy-based governance
pubcrawl
register transfer level information flow security models
resilience
intellectual property security
secret information
security
security behavior
Security Properties
Semantics
Theorem Proving
third-party intellectual property cores
Trojan horses
golden reference design
composability
Coq
fine grained gate level information flow model
formal representations
formal security verification
Formal Specification
formal verification
formal verification method
Complexity theory
Hardware
hardware designs
Hardware Security
hardware trojan
industrial property
information flow analysis
Integrated circuit modeling
biblio
Image steganography using texture features and GANs
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
complex texture regions
varisized images
truncated layer
texture-based loss
texture features
texture feature
stego images
stego image distortions
natural images
invisible perturbations
Image Steganography
hidden writing
encoder-decoder framework
cover images
convolutional network
feature extraction
Adversarial training
adversarial discriminator
Steganography
secret information
mean squared error
image texture
deep neural networks
QR codes
QR code
cyber physical systems
Cryptography
pubcrawl
Resiliency
biblio
A Security Problem in Cloud Auditing Protocols
Submitted by aekwall on Mon, 03/09/2020 - 10:05am
auditing
Security Audits
subverted auditing protocol instantiation
subverted auditing frame
subversion attack
publity
PRISM
Mikhail Bellare
cloud auditing protocols
cloud auditing protocol
basic security model
Cloud Computing
secret information
Scalability
cloud server
security problem
pubcrawl
Human behavior
Resiliency
data owner
Cryptography
biblio
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains
Submitted by aekwall on Mon, 03/02/2020 - 11:26am
Virtual private networks
virtual private networks connections
trustless two-factor authentication
server authentication
security component
secure web service
secure shell protocol
OpenSSH server
blockchain platform
authentication systems
authentication request
authentication purpose
two factor authentication
secret information
Human Factors
security of data
blockchain technology
password
smart contracts
message authentication
authentication
web services
internet
blockchain
bitcoin
pubcrawl
Trusted Party
Cryptographic Protocols
telecommunication security
Servers
biblio
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV
Submitted by aekwall on Mon, 03/02/2020 - 11:25am
minimum human interventions
vehicle sensors
Physical Unclonable Function
two-factor authentication
AKA protocol
elaborate security analysis
ever-increasing penetration
factor authentication protocol
Internet of Vehicles
IoV
key agreement protocol
Physical attack
mutual authentication
onboard sensors
physically secure authentication
route planning
secret information
transportation sector
user device
vehicle management
two factor authentication
authentication
authorisation
data privacy
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
pubcrawl
vehicular ad hoc networks
privacy
Servers
message authentication
password
public key cryptography
physical attacks
sensors
information protection
Human Factors
Security Properties
PUF
biblio
A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks
Submitted by grigby1 on Fri, 02/22/2019 - 3:08pm
long-term confrontation
without embedding
Transform coding
Training
trained generator neural network model
traditional embedding-based steganography
steganography detection
Steganography
state-of-the-art image steganalysis algorithms
secret information
Resists
pubcrawl
privacy
noise vector
Metrics
machine-learning-based steganalysis algorithms
Brain modeling
learning (artificial intelligence)
image SWE method
image steganography method
image generation
Image coding
generative adversarial networks
Gallium nitride
feedforward neural nets
distortion
digital images
deep convolutional generative adversarial networks
data encapsulation
coverless
composability
carrier image
biblio
Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach
Submitted by rvmeush on Fri, 09/26/2014 - 12:03pm
Computational modeling
covert channels
Lattices
Processor scheduling
secret information
secure information flow
security
security of data
Semantics
Sensitivity
timing