Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
embedded devices
biblio
Analysis of Rabin-P and RSA-OAEP Encryption Scheme on Microprocessor Platform
Submitted by aekwall on Mon, 01/25/2021 - 11:57am
encryption
Internet of Things
Raspberry Pi
embedded devices
Linux
Resiliency
Human behavior
pubcrawl
composability
Metrics
public key cryptography
energy consumption
microprocessor chips
decryption process
Asymmetric Encryption
Linux operating system
Internet of Things structure
microprocessor platform
Optimal Asymmetric Encryption Padding (OAEP)
Rabin-p
Rabin-p cryptosystem
Rabin-P encryption scheme
Raspberry Pi setup
Raspbian
Raspbian OS
Rivest-Shamir-Adleman (RSA)
RSA-OAEP cryptosystem
RSA-OAEP encryption scheme
biblio
Secure Real-Time Heterogeneous IoT Data Management System
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
authorisation
cloud
Cloud Computing
composability
Cryptography
cyber-physical system security
data analysis
data privacy
Data Security
diverse IoT devices
drone-based data
drones
edge computing
edge device
embedded devices
end-to-end data encryption mechanism
heterogeneous data
Internet of Things
IoT
IoT devices
IOT edge computing
large-scale data analytics
machine learning
neural style transfer
on-device computing
performance evaluation
Predictive Metrics
pubcrawl
real-time data collection
real-time data processing system
Real-time monitoring
real-time systems
Resiliency
Scalability
secure platform
secure real-time heterogeneous IoT data management
secure systems
security
sensitive data
Software
streaming IoT data
surveillance
time data analytics system
Trusted Execution Environment
trusted platform modules
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
Scalability
Access Control
authorisation
Cryptography
data confidentiality
encryption
abe
attribute-based encryption
Internet of Things
data integrity
embedded devices
Human behavior
pubcrawl
policy-based governance
wireless sensor networks
Intelligent sensors
Constrained Devices
actuators
communication overhead
CP-ABE
ABE scheme
ABE techniques
attribute-based scheme
broadcast
ciphertext-policy attribute-based encryption
fABElous
industrial IoT applications
technological vision
biblio
An Efficient Fault Detection Method for Elliptic Curve Scalar Multiplication Montgomery Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 11:54am
Circuit faults
classical asymmetric cryptosystems
Conferences
cryptographic computation
ECC
efficient countermeasure
efficient fault detection method
Elliptic curve cryptography
Elliptic curve cryptography (ECC)
elliptic curve Scalar Multiplication Montgomery algorithm
Elliptic curves
Elliptical Curve Cryptography
embedded devices
Fault Attacks
fault detection
Fault detection method
fault diagnosis
fault injection attack
Hardware
key sizes
Metrics
Montgomery ladder
Montgomery Scalar Multiplication algorithm
power consumption
pubcrawl
public key cryptography
public key cryptosystems
resilience
Resiliency
Scalability
smaller keys
biblio
Secure firmware update in embedded systems
Submitted by aekwall on Mon, 06/15/2020 - 9:58am
security
Cryptography
telecommunication security
embedded systems
embedded devices
Resiliency
pubcrawl
composability
Metrics
firmware
Embedded System
authenticity
confidentiality
intellectual property
Hash functions
man-in-the-middle
Asymmetric Encryption
asymmetric encryption algorithms
great numbers
man-in-the-middle attacks
potential attackers
safety critical operations
secure firmware update
secure update process
specific encryption algorithms
symmetric encryption
symmetric encryption algorithms
target hardware
update
update package encryption process
weak point
biblio
A Secure Multi-Factor Remote User Authentication Scheme for Cloud-IoT Applications
Submitted by aekwall on Mon, 02/10/2020 - 11:03am
Cloud Computing
authorisation
Big Data
Internet of Things
telecommunication security
Cryptographic Protocols
Protocols
embedded devices
Resiliency
pubcrawl
Metrics
authentication
password
smart cards
security problems
Human Factors
multifactor authentication
biometrics (access control)
cloud-IoT applications
cloud-IoT environment
communication technology
Kalra's scheme
resource limited devices
secure multifactor authentication protocol
secure multifactor remote user authentication scheme
session key disclosure attacks
biblio
A Security Architecture for RISC-V based IoT Devices
Submitted by aekwall on Mon, 02/10/2020 - 10:43am
3D-SiP
authenticated watchdog timer
automation
composability
core security features
Cryptography
customizable Internet of Things platform
Device Security
embedded devices
Fraunhofer Institutes
Hardware
Internet of Things
IoT
IoT applications
IoT market
medium security level
Microelectronics Security
Monitoring
p
Predictive Metrics
pubcrawl
reduced instruction set computing
Resiliency
RISC-V
RISC-V based IoT devices
RISC-V ISA
Scalability
scalable computing subsystem
Scalable Security
Secure Boot
secure deployment
security architecture
security concept
SIP
small and medium-sized enterprises
small-to-medium enterprises
SME
Software
strict power constraints
system-in-package
system-on-chip
three dimensional system-in-package
Universal Sensor Platform SoC
USeP SoC
watchdog timer
biblio
Facial-based Intrusion Detection System with Deep Learning in Embedded Devices
Submitted by aekwall on Mon, 12/30/2019 - 11:12am
Resiliency
Human behavior
pubcrawl
Metrics
Intrusion Detection
deep learning
convolutional neural network
embedded devices
facial recognition
biblio
Implementation of a C-UNB Module for NS-3 and Validation for DLMS-COSEM Application Layer Protocol
Submitted by grigby1 on Thu, 12/05/2019 - 9:52am
access protocols
Adaptation models
advanced metering infrastructure
asynchronous bandwidth devices
bandwidth channels
Base stations
C-UNB wireless networks
cellular radio
clean slate
clean-slate cellular network technology
collaboration
Device Language Message Specification-Companion Specification
DLMS-COSEM application layer protocol
embedded devices
Human behavior
Human Factors
Internet of Things (IoT)
lightweight random access protocol
low-bandwidth devices
low-power wide area wireless network technologies
machine-to-machine (M2M)
Mathematical model
medium access control layer
Metrics
network simulation module
ns-3
Physical layer
Policy
Policy Based Governance
policy governance
power meters
probability of successful transmission
Protocols
pubcrawl
random access
remote site
resilience
Resiliency
Servers
smart meters
smart power grids
ultra narrow band
urban area
wide area networks
Zigbee
biblio
Light Database Encryption Design Utilizing Multicore Processors for Mobile Devices
Submitted by aekwall on Mon, 11/04/2019 - 10:23am
commodity multicore processors
composability
Cryptography
data confidentiality
Data protection
Databases
device processing resources
embedded devices
embedded systems
encryption
full disk encryption
handheld devices
Human behavior
light database encryption design
massive storage systems
Metrics
mobile computing
mobile devices
multicore CPU
multicore computing security
Multicore processing
multiprocessing systems
parallel database encryption system
parallel databases
Performance
performance evaluation
pubcrawl
RDBMS
relational database security
relational databases
Resiliency
Scalability
smart phones
SQLite databases
SQLite RDBMS
SQLite-XTS
storage management
storage security
user sensitive data
XTS encryption
1
2
next ›
last »