Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Trusted Platform Module
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
security risks
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
IoT security solutions
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
authentication
IoT devices
IoT architecture model
Internet of Things
general Internet of Things architecture
examined IoT solutions
encryption
device management
device level encryption
cyber-physical system security
Cryptography
computer architecture
Computational modeling
composability
built-in security features
basic firewall protection
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 11:31am
pubcrawl
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
industrial control system
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
dynamic security control architecture
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
composability
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 2:44pm
VoIP
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
quality of service
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
internet
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
attack scenarios
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
biblio
Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
oAuth2.0
verification mechanism
update mechanisms
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TLS 1.3
tamper resistant endpoints
Software
smart buildings
smart building cyber-physical systems
security of data
secure communication channels
Resiliency
pubcrawl
composability
IT-security
IoT
Internet of Things
integrity measurement mechanisms
hardware-based security
Hardware
firmware
data integrity
cyber-physical systems
Cryptography
critical infrastructures
critical infrastructure
CPS devices
Containers
computer science
biblio
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
Submitted by aekwall on Mon, 03/11/2019 - 10:37am
Safety
Trusted Platfrom Modules
trusted platform modules
Trusted Platform Module
Trusted Computing
TPMs
tpm
system manipulation
Software
security of data
security mechanisms
security
secure elements
Availability
Resiliency
Reliability
Redundancy
pubcrawl
Industry 4.0
Hardware
embedded systems
dependability features
cyber-physical systems
cyber-attacks
cyber physical systems
composability
biblio
Distributed Usage Control Enforcement Through Trusted Platform Modules and SGX Enclaves
Submitted by aekwall on Mon, 03/11/2019 - 10:36am
Access Control
SGX
Resiliency
pubcrawl
composability
secure remote computation
Trusted Platform Module
Trusted Reference Monitor
usage control
Trusted Platfrom Modules
biblio
Building Blocks for Identity Management and Protection for Smart Environments and Interactive Assistance Systems
Submitted by grigby1 on Thu, 02/14/2019 - 11:17am
Distributed Usage Control
Human Factors
Identity management
Interactive Environments
Metrics
pubcrawl
Remote Attestation
Scalability
Smart Assistance Systems
Tamper resistance
Trusted Platform Module
Trusted Reference Monitor
biblio
FADETPM: Novel approach of file assured deletion based on trusted platform module
Submitted by grigby1 on Wed, 09/12/2018 - 11:18am
Scalability
Handheld computers
integrity
internet
Memory
offline data storage
outsourced data files
privacy
pubcrawl
File Assured Deletion
SSP
storage management
storage service provider
tpm
Trusted Computing
Trusted Platform Module
VANISH
Business
file access policies
FADETPM
FADE
Ephemerizer
data privacy
data integrity
data deletion
Cryptography
cryptographic issues
computer storage space
computer storage management
computer security
cloud storage
Cloud Computing
business risk
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 3:24pm
key connectivity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
authenticity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
wireless sensor networks
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
security
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
« first
‹ previous
1
2
3
4
next ›
last »