Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
VRF
biblio
PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems
Submitted by aekwall on Mon, 08/17/2020 - 10:37am
attestation
embedded systems
security service
invasive software
software state
Resiliency
Human behavior
pubcrawl
composability
microcontrollers
low-end embedded devices
compromised state
current memory state
erasure
formally verified RA architecture
functional state
important security services
low-end embedded systems
malware-free state
obtain proofs
provably secure software update
Prv memory
remote Prv
secure RA architecture
system-wide resets
trusted verifier
untrusted remote prover
useful security services
verified remote attestation
VRASED
VRF
biblio
On Several Verifiable Random Functions and the Q-Decisional Bilinear Diffie-Hellman Inversion Assumption
Submitted by grigby1 on Tue, 10/08/2019 - 3:44pm
Human behavior
Metrics
pairings
pubcrawl
q-type assumptions
random key generation
resilience
Resiliency
Scalability
verifiable random function
VRF
biblio
Cryptography classes in bugs framework (BF): Encryption bugs (ENC), verification bugs (VRF), and key management bugs (KMN)
Submitted by grigby1 on Wed, 02/21/2018 - 12:39pm
BF taxonomy
authentication
attacks
bug classes
Bug taxonomy
bugs framework
clear descriptions
Computer bugs
Cryptography
cryptography classes
cryptography related classes
developed BF classes
ENC
encryption
Encryption bugs
Human behavior
key management
key management bugs
KMN
Metrics
program debugging
program diagnostics
program verification
proximate causes
pubcrawl
related dynamic properties
resilience
Resiliency
rigorous definitions
Scalability
secondary causes
soft-ware weaknesses
Software
software vulnerabilities
software weaknesses
taxonomy
tertiary causes
unambiguous definitions
verification bugs
VRF