Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Resistance
biblio
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing
Submitted by grigby1 on Tue, 02/23/2021 - 1:26pm
accountable financial transaction processing
bank account
bank data processing
banking service
BDB
blockchain-based distributed banking
centralized banks
composability
contracts
cryptocurrencies
Cryptography
Distributed Banking
distributed banking systems
distributed banking transactions
Distributed databases
distributed financial transaction processing
Distributed Ledger Technology
immutable transactions
Metrics
Monitoring
network accountability
permissioned blockchain
Protocols
pubcrawl
public key infrastructure
resilience
Resiliency
Resistance
smart contract
transaction processing
biblio
A Fuzzy String Matching Scheme Resistant to Statistical Attack
Submitted by aekwall on Mon, 01/18/2021 - 10:35am
Bloom filter
Cloud Computing
Cryptography
data structures
Encrypted Cloud Database
encryption
frequency distribution
Fuzzy Cryptography
Fuzzy Query
fuzzy query scheme
fuzzy set theory
fuzzy string matching scheme
Indexes
Metrics
noise vector
pubcrawl
query processing
Resiliency
Resistance
S-BF
Scalability
secure fuzzy query
statistical attack
string matching
vector index
biblio
Foiling Sybils with HAPS in Permissionless Systems: An Address-based Peer Sampling Service
Submitted by aekwall on Mon, 12/14/2020 - 11:44am
Protocols
Resiliency
pubcrawl
composability
sybil attacks
Peer-to-peer computing
Metrics
standards
fault tolerant computing
cryptocurrencies
Distributed databases
Probabilistic logic
Topology
malicious attacks
open systems
Weight measurement
Resistance
distributed ledgers
proof-of-stake
address-based peer sampling service
Blockchain mechanisms
Byzantine fault-tolerant protocols
Byzantine-tolerant peer-sampling service
decentralized systems
epidemic protocols
HAPS
perfect peer-sampling service
permissionless systems
Proof-of-work
sybils
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 10:23am
computer network security
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
security threats
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
3D PAKE protocol
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
heterogeneous networked society
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
biblio
Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain
Submitted by grigby1 on Mon, 11/02/2020 - 11:30am
bitcoin
blockchain
blockchain-based storage
blockchain-based time-stamping scheme
chain quality
Chronos
Cloud Computing
composability
Cryptography
digital files
digital investigations
earliest creation time
file protection
industrial property
intellectual property security
intellectual property systems
patentable ideas
patents
policy-based governance
pubcrawl
resilience
Resiliency
Resistance
secure time-stamping schemes
Servers
time interval
biblio
Development of Models in Resilient Computing
Submitted by grigby1 on Tue, 10/06/2020 - 12:40pm
Biological system modeling
checkability
Circuit faults
computational checkability
Computational modeling
computing development
computing evolution factors
Computing Theory
critical applications
elastic computing
elasticity
evolutionary computation
evolutionary development
fuzzy set theory
growth challenge
harsh resistance
irreversible development processes
modelling
parallel processing
Perturbation methods
perturbations
problem solving
pubcrawl
resilience
Resiliency
resilient computing
Resistance
resistive computing
resistivity
resource boundaries
resource niche
reversible and irreversible processes
reversible development processes
smarter elasticity
biblio
Creation of Adversarial Examples with Keeping High Visual Performance
Submitted by grigby1 on Fri, 09/11/2020 - 10:46am
learning (artificial intelligence)
machine learning
CNN
convolutional neural nets
Neural networks
pubcrawl
Human behavior
security
Mathematical model
composability
Perturbation methods
Resistance
image classification
adversarial examples
visualization
convolutional neural network
image recognition
captchas
CAPTCHA
artificial
character images
character recognition
character string CAPTCHA
convolutional neural network (CNN)
FGSM
high visual performance
human readability
image recognition technology
intelligence
biblio
Automated Synthesis of Differential Power Attack Resistant Integrated Circuits
Submitted by aekwall on Mon, 08/24/2020 - 11:41am
private key cryptography
Resiliency
pubcrawl
composability
Cryptography
standards
tools
Libraries
Automated Response Actions
Logic gates
power consumption
Power demand
logic design
Hardware Security
Resistance
combinational circuits
Automated Synthesis
CMOS logic circuits
CMOS synthesis
combinational cells
cryptographic processors
cryptographic systems
differential circuit design
differential logic
Differential Power Analysis
differential power analysis attacks
differential power attack resistant integrated circuits
DPA attack resistance
DPA resistant cell designs
Dynamic Differential Logic
fully automated synthesis system DPA resistant integrated circuits
MDPL
multiplying circuits
RT level Verilog specifications
secret key information
Secure Differential Multiplexer Logic
sequential cells
sequential circuits
biblio
White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing
Submitted by aekwall on Mon, 07/20/2020 - 9:45am
Resiliency
composability
graph theory
Cryptography
Computational modeling
Metrics
testing
computational complexity
Complexity theory
pubcrawl
Integrated circuit modeling
Resistance
search problems
black-box complexity
black-box hardness
box times
collision-resistant hashing
description size
graph property testing
graph size
hard property
Ramsey theory
succinct black-box
TFNP problems
the Ramsey problem
white-box complexity
white-box hardness
white-box model
white-box Ramsey problem
white box cryptography
biblio
CAN Radar: Sensing Physical Devices in CAN Networks based on Time Domain Reflectometry
Submitted by aekwall on Mon, 07/20/2020 - 9:43am
Intrusion Detection
IDS
Internet of Things
cyber-physical systems
Resiliency
pubcrawl
Anomaly Detection
security vulnerabilities
security mechanisms
sensors
Intrusion Detection Systems
protocol
automotive security
controller area network
controller area network security
Impedance
power transmission lines
Transmission line measurements
Resistance
controller area networks
automotive networks
broadcast medium
CAN radar networks
Distance measurement
Impedance measurement
malicious message transmission
radar detection
radar receivers
Resistors
sensing unit
TDR technique
time domain reflectometry technique
time-domain reflectometry
transceivers
vehicle network
1
2
3
4
next ›
last »