Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
coding theory
biblio
SandTrap: Tracking Information Flows On Demand with Parallel Permissions
Submitted by
grigby1
on Thu, 12/05/2019 - 9:47am
coding theory
Compositionality
Cryptography
dynamic information-flow tracking
Metrics
native code
parallel memory permissions
pubcrawl
resilience
Resiliency
security
biblio
Context-Sensitive Flow Graph and Projective Single Assignment Form for Resolving Context-Dependency of Binary Code
Submitted by
grigby1
on Thu, 12/05/2019 - 9:47am
binary code analysis
coding theory
Compositionality
context-dependency
Cryptography
Metrics
pubcrawl
resilience
Resiliency
security
static single assignment
biblio
A Lightweight Timestamp-Based MAC Detection Scheme for XOR Network Coding in Wireless Sensor Networks
Submitted by
grigby1
on Thu, 12/05/2019 - 9:47am
coding theory
Compositionality
Cryptography
MAC detection
Metrics
pubcrawl
resilience
Resiliency
security
WSN
xor network coding
biblio
Local-Encoding-Preserving Secure Network Coding for Fixed Dimension
Submitted by
grigby1
on Thu, 12/05/2019 - 9:47am
coding theory
Compositionality
computational complexity
Cryptography
encoding
field size
fixed dimension
Image edge detection
information rate
Information rates
information-theoretic security
Kernel
linear codes
local encoding kernel
local-encoding-preserving secure network coding
lower bound
Metrics
network coding
polynomial-time algorithm
pubcrawl
Random variables
resilience
Resiliency
secure linear network code
security
security level
security-level pairs
SLNC
telecommunication security
biblio
Secure Physical Layer Network Coding versus Secure Network Coding
Submitted by
grigby1
on Thu, 12/05/2019 - 9:47am
coding theory
Compositionality
computation and forward
Cryptography
error correction
error correction codes
Metrics
network coding
Noise measurement
noiseless network
noisy channel
Physical layer
physical layer security
pubcrawl
Receivers
resilience
Resiliency
secrecy analysis
secure communication
secure physical layer network coding
security
Silicon
Task Analysis
telecommunication security
biblio
A Cloud Storage Resource Transaction Mechanism Based on Smart Contract
Submitted by
grigby1
on Thu, 12/05/2019 - 9:47am
cloud storage
coding theory
Compositionality
Cryptography
Erasure Coding
Metrics
pubcrawl
resilience
Resiliency
security
smart contract
VCG mechanism
biblio
Secure Coding Practices in Java: Challenges and Vulnerabilities
Submitted by
grigby1
on Wed, 10/30/2019 - 9:53am
coding theory
security
application program interfaces
authentication
authorisation
authorization
authorization features
Certificate Validation
complex Java-based
complicated cross-language data handling
Computer crime
cross-site request forgery attacks
cryptographic hash functions
Cryptography
cryptography API
CSRF
developers time
empirical study
encoding
insecure coding practices
Java
Java platform
Java secure coding
Libraries
multiple security vulnerabilities
programming
programming challenges
programming obstacles
pubcrawl
resilience
Resiliency
Scalability
Secure Coding
secure coding assistance
secure coding practices
Security by Default
Spring security
SSL-TLS security
SSL/TLS
StackOverflow
StackOverflow forum
StackOverflow posts
third-party framework
third-party libraries
XML
XML-based approaches
biblio
Hardening AES Hardware Implementations Against Fault and Error Inject Attacks
Submitted by
grigby1
on Thu, 02/14/2019 - 10:18am
coding theory
security
AES
error correction
error detection
Human Factors
Metrics
non-linearity
pubcrawl
robust codes
Scalability
Tamper resistance
biblio
Survey on Cryptanalysis of Code-Based Cryptography: From Theoretical to Physical Attacks
Submitted by
grigby1
on Thu, 02/14/2019 - 10:12am
pubcrawl
composability
encryption
physical attacks
Compositionality
Computers
Decoding
quantum computer
public key cryptography
side-channel analysis
quantum cryptography
adequate post-quantum cryptographic schemes
code-based cryptography
coding theory
discrete logarithm
elliptic curve
linear codes
McEliece scheme
NIST's announcement
number theory
number theory problems
oldest quantum-resistant proposition
polynomial time
polynomials
Post-quantum cryptography
post-quantum standardization
public-key cryptography
public-key cryptosystem
side-channel attacks
strong mathematical background
structural attacks
theoretical cryptography
biblio
Finding Dependencies Between Cyber-Physical Domains for Security Testing of Industrial Control Systems
Submitted by
aekwall
on Wed, 02/13/2019 - 11:01am
coding theory
security
Attack vectors
Cyber Dependencies
cyber-physical systems
Human behavior
ICS security
Information Flow
pubcrawl
Resiliency
Scalability
1
2
3
4
5
next ›
last »