Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Logic gates
biblio
IoT Content Object Security with OSCORE and NDN: A First Experimental Comparison
Submitted by aekwall on Mon, 02/22/2021 - 1:37pm
multihop scenarios
DTLS
DTLS sessions
end-to-end transport
first experimental comparison
information-centric Named Data Networking protocol
IoT content Object Security
large-scale IoT
low power lossy links
measure protocol performances
MQTT-SN
content transfer
NDN attains superior robustness
network experimentation
OSCORE
protocol stacks
protocol translations
proxies
request-response transactions
secure networking
security sessions
single-hop scenarios
Libraries
IP networks
Scalability
Internet of Things
Protocols
transport protocols
Resiliency
Human behavior
pubcrawl
Cryptography
internet
computer network security
Logic gates
named data networking
internetworking
ICN
Information Centric Networks
gateways
CoAP
Constrained RESTful Environments
content object security features
content security end-to-end
biblio
Design of an Augmented Reality System for Immersive Learning of Digital Electronic
Submitted by grigby1 on Wed, 02/03/2021 - 1:08pm
immersive learning
tools
resilience
pubcrawl
privacy
Multimedia systems
mobile learning
mobile computing
Mobile Applications
Mobile Application
Logic gates
Libraries
ios
interactive systems
interactive app
immersive systems
Human Factors
Human behavior
electronic engineering education
electronic engineering computing
education
digital electronics
Digital circuits
cyber physical systems
computer aided instruction
composability
Cameras
augmented reality system
augmented reality
biblio
Quantum Homomorphic Encryption Based on Quantum Obfuscation
Submitted by aekwall on Mon, 02/01/2021 - 11:36am
open question
telecommunication security
Scalability
Resiliency
Registers
Quantum point function
quantum obfuscation
Quantum mechanics
quantum homomorphic encryption scheme
Quantum homomorphic encryption
quantum computing security
quantum computation
public key cryptography
quantum computing
Metrics
Logic gates
Human Factors
Homomorphic encryption
encryption operator
encryption
encrypting party
encrypted data
decrypting party
data privacy
pubcrawl
security
biblio
Multi-Key Homomorphic Encryption Create new Multiple Logic Gates and Arithmetic Circuit
Submitted by aekwall on Mon, 02/01/2021 - 11:34am
Homomorphic encryption
multikey homomorphic encryption
multi-party computation
MK-TFHE library
arithmetic circuit
digital arithmetic
Logic gates
Boolean Circuit
arithmetic operations
Arithmetic Algorithm
Cloud Computing
Human Factors
cloud services
Metrics
pubcrawl
Resiliency
telecommunication security
Cryptography
Scalability
biblio
A Privacy and Authentication Scheme for IoT Environments Using ECC and Fuzzy Extractor
Submitted by aekwall on Mon, 01/18/2021 - 11:26am
IoT environments
Fuzzy Cryptography
user authentication
user anonymity
use cases
Privacy.
popular attacks
negative horizon
LightPriAuth
key establishment
insider attack
complementary elements
fuzzy extractor
authentication scheme
Smart card
IoT
ECC
Logic gates
smart cards
password
message authentication
authentication
Metrics
privacy
pubcrawl
Resiliency
Internet of Things
data privacy
Cryptography
Scalability
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 12:23pm
security risks
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
IoT security solutions
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
authentication
IoT devices
IoT architecture model
Internet of Things
general Internet of Things architecture
examined IoT solutions
encryption
device management
device level encryption
cyber-physical system security
Cryptography
computer architecture
Computational modeling
composability
built-in security features
basic firewall protection
biblio
Building Dynamic Mapping with CUPS for Next Generation Automotive Edge Computing
Submitted by grigby1 on Wed, 12/02/2020 - 2:03pm
response latency
Logic gates
mobility management (mobile radio)
next generation automotive edge computing
next generation networks
next-generation intelligent transportation system
Prototypes
pubcrawl
resilience
Resiliency
local edge server
road traffic
Scalability
Servers
synchronisation
telecommunication control
telecommunication traffic
traffic accidents
traffic engineering computing
vehicle dynamics
data traffic
5G mobile communication
5G networks
central cloud-based approach
central server
Cloud Computing
computer architecture
control and user plane separation
coupled congestion control
CUPS
5G
Dynamic mapping
dynamic mapping traffic
edge computing
edge computing architecture
edge servers
global dynamic mapping information
Intelligent Transportation Systems
Internet of Things
IoT
biblio
SharaBLE: A Software Framework for Shared Usage of BLE Devices over the Internet
Submitted by grigby1 on Tue, 12/01/2020 - 4:38pm
Internet of Things
wireless communication technologies
Software
short communication range
Servers
Scalability
RESTful API
Resiliency
resilience
remote BLE IoT devices
pubcrawl
Policy Based Governance
Metrics
Logic gates
Internet-scale Computing Security
application program interfaces
internet
Human Factors
Human behavior
generic service stack
energy consumption
computer network reliability
composability
collaboration
cloud-based software framework
Cloud Computing
bluetooth low energy
Bluetooth
BLE-equipped device
biblio
Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges
Submitted by aekwall on Mon, 11/23/2020 - 11:27am
Traffic Management
Intelligent Data and Security
Intelligent Data Security
sustainable adoption
Security Classification
security approaches
multitier ITS security framework
ITS trust challenges
coherent reference architecture
business intelligence development
Big Data security frameworks
reference architecture
big data technologies
Intelligent Transportation Systems
Intelligent Transportation System
Scalability
Compositionality
Logic gates
Data processing
authentication
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
computer architecture
Trusted Computing
Internet of Things
Big Data
authorization
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »