Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Cathode ray tubes
biblio
Copker: A Cryptographic Engine Against Cold-Boot Attacks
Submitted by
aekwall
on Mon, 11/30/2020 - 11:08am
Internet of Things
private key cryptography
Kernel
Resiliency
pubcrawl
Cryptography
cyber physical systems
random number generation
Random access memory
RSA
Computers
Compositionality
Registers
memory data
cryptographic keys
sensitive information
deterministic random bit generator
private key
Cathode ray tubes
Cache-as-RAM
cold-boot attack
cold-boot attacks
Copker stores kilobytes
CPU registers
cryptographic engine
cryptographic services
deterministic random bit generators
disk encryption
ECDSA signing
key-encryption key
multiple private keys
on-chip CPU caches
PGP Email clients
plain-text sensitive data
popular asymmetric cryptosystems
public-key cryptography implementation
RAM chips
suspend mode
Magnetic Remanence
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by
aekwall
on Mon, 08/10/2020 - 9:49am
encryption
Computational efficiency
decryption
Resiliency
Human behavior
pubcrawl
privacy
Metrics
Public key
public key cryptography
Security analysis
Compositionality
symmetric cryptography
network resources
Asymmetric Encryption
communication overhead
asymmetric cryptography
Cathode ray tubes
Chinese remainder theorem
chosen plaintext attack
dynamic networks
group membership changes
high computational cost
lightweight AMOUN
lightweight scalable multirecipient asymmetric cryptographic scheme
Multi-recipient Encryption
multiple recipients
MultiRSA
securing multiparty communication
biblio
A Detection and Defense Approach for Content Privacy in Named Data Network
Submitted by
grigby1
on Thu, 03/12/2020 - 11:02am
Attack detection
brute force attack model
brute force timing attack
cache storage
Cathode ray tubes
computer network security
consumer privacy
content privacy
countermeasure methods
Cryptography
data privacy
delays
internet
IP networks
named data network
Named Data Network Security
NDN
privacy
pubcrawl
resilience
Resiliency
Scalability
side-channel timing attack
side-channel timing response
signature based defense
telecommunication channels
telecommunication network routing
telecommunication network topology
tools