Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
cryptographic keys
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by aekwall on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
Secret Sharing Schemes with Hidden Sets
Submitted by aekwall on Mon, 06/01/2020 - 10:03am
Analytical models
cloud providers
Computational modeling
Computers
cryptographic keys
Cryptographic Protocols
Cryptography
detect hidden sets
Human behavior
Human Factors
interpolation
malicious dealer
Metrics
multifactor authentication
polynomial
polynomials
Protocols
pubcrawl
resilience
Resiliency
set theory
Shamirs secret sharing scheme
telecommunication security
uniform distribution
biblio
NeXUS: Practical and Secure Access Control on Untrusted Storage Platforms using Client-Side SGX
Submitted by grigby1 on Wed, 03/18/2020 - 11:26am
Outsourced Database Integrity
Metrics
composability
Resiliency
Access Control
access revocations
access rights
application program interfaces
authorisation
client side
client-outsourced data
client-side Intel SGX enclave
client-side SGX
Cloud Computing
common file
cryptographic approaches
cryptographic keys
cryptographic solutions
Cryptography
data privacy
database operations
dropbox
dynamic sharing
encryption
file access API
file organisation
file servers
file-sharing services
fine-grained access control policies
google drive
Hardware
key revocation
management burdens
NEXUS prototype
NEXUS volumes
nontrivial key management
openafs
outsourcing
performance overheads
performant platform-agnostic
protected volumes
pubcrawl
re-encryption overheads
resilience
rising popularity
rootkey
secure access control
Secure File Sharing
security concern
selective sharing
server-side support
Servers
severe re-encryption penalties
biblio
Quantum Electronic Generator of Random Numbers for Information Security in Automatic Control Systems
Submitted by aekwall on Mon, 03/16/2020 - 9:41am
automated driving systems
automatic control systems
communication lines
composability
Compositionality
computer systems
computer units
computing nodes
control system security
cryptographic keys
Cryptography
electron-quantum generator
electrons tunneling
Generators
information security
neural nets
NIST
NIST statistical tests
Predictive Metrics
pubcrawl
quantum computing
quantum computing security
quantum cryptography
quantum electronic generator
quantum random numbers generator
random number generation
random numbers
random numbers application
Random sequences
Random walks
Reliability
resilience
Resiliency
Scalability
Scientific Computing Security
semiconductor electronic components
statistical testing
tunneling
tunnelling
biblio
True2F: Backdoor-Resistant Authentication Tokens
Submitted by aekwall on Mon, 03/02/2020 - 11:27am
security
authorisation
data privacy
Hardware
Cryptographic Protocols
Protocols
pubcrawl
standards
Computer crime
web services
privacy
authentication
digital signatures
Public key
public key cryptography
Human Factors
Browsers
cryptographic keys
two factor authentication
backdoor-resistant authentication tokens
Backdoors
commodity hardware tokens
conventional authentication tokens
cross-origin token-fingerprinting attacks
ECDSA signatures
embedded-systems
Phishing
privacy defenses
second-factor authentication
software compromise
token faults
two-party protocols
biblio
An Efficient Memory Zeroization Technique Under Side-Channel Attacks
Submitted by aekwall on Mon, 02/24/2020 - 9:55am
security of data
Cryptography
Hardware
Memory management
security
system-on-chip
Resiliency
pubcrawl
security attacks
data deletion
Random access memory
Engines
Compositionality
remanence
cryptographic keys
Temperature sensors
built-in self test
content protection
efficient memory zeroization technique
MBIST based content zeroization approach
memory built-in-self-test hardware
memory security
Memory Zeroization
on-chip memory contents
private memory contents
random-access storage
secret data
secured data content
security violations
Side-channel attack
side-channel attacks
volatile memories
biblio
Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets
Submitted by grigby1 on Tue, 01/21/2020 - 10:36am
authorisation
blockchain
Computational modeling
credentials
cryptocurrencies
cryptocurrency
cryptographic keys
Cryptography
Data models
data privacy
decentralized key recovery solution
digital identity management
digital wallet
distributed ledger
financial data processing
Human behavior
Hyperledger Indy distributed ledger technology
Identity management
identity management services
key recovery
Online banking
password
practical key recovery model
proof-of-concept digital wallet
Protocols
pubcrawl
resilience
Scalability
secure management
Self-Sovereign Identity
shamir secret sharing
biblio
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines
Submitted by aekwall on Mon, 12/02/2019 - 11:08am
Scalability
Cryptography
encryption
Kernel
Resiliency
pubcrawl
Metrics
Data protection
OS kernel
Random access memory
Engines
operating systems (computers)
Compositionality
Registers
program compilers
automatic protection
code fragments
compiler
confidentiality
cryptographic engines
Cryptographic Implementation
cryptographic keys
DRAM chips
memory disclosure attack
memory disclosure attacks
OS-independent memory confidentiality
Peapods
sensitive variables
software engines
Transactional memory
user-mode protection
compiler security
biblio
Cryptographic key management methods for mission-critical wireless networks
Submitted by grigby1 on Wed, 02/21/2018 - 12:40pm
Access Control
resilience
pubcrawl
Resiliency
Human behavior
Protocols
Scalability
authentication
Cryptographic Protocols
key management
message authentication
authorisation
computer network security
data integrity
telecommunication traffic
Metrics
security requirements
adequate communication services
authentication protocol
Cellular networks
communication infrastructures
community resources
critical-mission wireless mesh networks
cryptographic key management methods
cryptographic keys
data communication security
DH-HEMTs
disasters
DoS attack problem
EHPFS
emergency related information
emergency response communications
emergency services
enhanced 4-way handshake with PFS support
fast pairwise key generation
IEEE 802.11 Standard
IEEE 802.11s
landline phone
mesh router
neighboring mesh routers
perfect forward secrecy (PFS)
primary master key
rekeying protocols
secure communication system
session key generation
session key PTK
wireless LAN
wireless mesh networks
biblio
TPM-supported key agreement protocols for increased autonomy in constellation of spacecrafts
Submitted by grigby1 on Mon, 11/13/2017 - 11:00am
composability
cryptographic keys
Cryptographic Protocols
DH-HEMTs
encryption
Jamming
opportunistic control center
payload links
protocol iterations
Protocols
pubcrawl
Resiliency
security mechanisms
space communication links
space missions
Space vehicles
spacecrafts
TPM-supported key agreement protocols
Trusted Platform Module
trusted platform modules
TT&c
1
2
next ›
last »