Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Trusted Platform Module
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 11:24am
authentication
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
Data protection
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
military applications
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
security domain
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
biblio
Study of Trust at Device Level of the Internet of Things Architecture
Submitted by aekwall on Mon, 12/07/2020 - 11:23am
authentication
basic firewall protection
built-in security features
composability
Computational modeling
computer architecture
Cryptography
cyber-physical system security
device level encryption
device management
encryption
examined IoT solutions
general Internet of Things architecture
Internet of Things
IoT architecture model
IoT devices
IoT security solutions
Logic gates
neural style transfer
Object recognition
Predictive Metrics
pubcrawl
Resiliency
Scalability
security risk
security risks
tamper proof
telecommunication security
Trusted Computing
Trusted Platform Module
trusted platform modules
unique device identifier
user authentication
biblio
A Dynamic Security Control Architecture for Industrial Cyber-Physical System
Submitted by grigby1 on Fri, 10/16/2020 - 10:31am
composability
Resiliency
cyber-physical system security
trusted platform modules
Anomaly Detection
control system security
control systems
Cryptography
data fusion
dynamic security control architecture
dynamic security control strategy
Dynamic strategy
firewalls
Firewalls (computing)
hardware encryption
ICs
industrial control
industrial control system
Industrial Control Systems
industrial cyber-physical system
information security
information security requirements
internal fire control wall
intrusion detection system
linkage verification
Protocols
pubcrawl
resilience
Scalability
secure industrial control information security system
Servers
Trusted Computing
trusted connection server
Trusted Platform Module
biblio
Integrity and Non-Repudiation of VoIP Streams with TPM2.0 over Wi-Fi Networks
Submitted by grigby1 on Tue, 10/15/2019 - 1:44pm
attack scenarios
authentication
composability
computer network security
Cryptographic Protocols
Cryptography
digital networks
digital signature
digital signatures
hardware-based trusted anchor
Human behavior
integrity
internet
internet-based communication
Internet Protocol
Internet telephony
IP networks
legacy phone technologies
Metrics
nonrepudiation
physical access
Protocols
pubcrawl
quality of service
random nodes
Repudiation
research project INTEGER
resilience
Resiliency
secure authentication
softphones
TPM2
Trusted Computing
trusted computing group
Trusted Platform Module
VoIP
VoIP communication
VoIP softphones
VoIP streams
Wi-Fi
Wi-Fi Networks
Wireless communication
Wireless fidelity
wireless LAN
wireless scenarios
wireless streaming
biblio
Concept of Smart Building Cyber-physical Systems Including Tamper Resistant Endpoints
Submitted by aekwall on Mon, 03/11/2019 - 9:37am
composability
computer science
Containers
CPS devices
critical infrastructure
critical infrastructures
Cryptography
cyber-physical systems
data integrity
firmware
Hardware
hardware-based security
integrity measurement mechanisms
Internet of Things
IoT
IT-security
oAuth2.0
pubcrawl
Resiliency
secure communication channels
security of data
smart building cyber-physical systems
smart buildings
Software
tamper resistant endpoints
TLS 1.3
Trusted Computing
Trusted Platform Module
trusted platform modules
Trusted Platfrom Modules
update mechanisms
verification mechanism
biblio
Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability
Submitted by aekwall on Mon, 03/11/2019 - 9:37am
Availability
composability
cyber physical systems
cyber-attacks
cyber-physical systems
dependability features
embedded systems
Hardware
Industry 4.0
pubcrawl
Redundancy
Reliability
Resiliency
Safety
secure elements
security
security mechanisms
security of data
Software
system manipulation
tpm
TPMs
Trusted Computing
Trusted Platform Module
trusted platform modules
Trusted Platfrom Modules
biblio
Distributed Usage Control Enforcement Through Trusted Platform Modules and SGX Enclaves
Submitted by aekwall on Mon, 03/11/2019 - 9:36am
Access Control
SGX
Resiliency
pubcrawl
composability
secure remote computation
Trusted Platform Module
Trusted Reference Monitor
usage control
Trusted Platfrom Modules
biblio
Building Blocks for Identity Management and Protection for Smart Environments and Interactive Assistance Systems
Submitted by grigby1 on Thu, 02/14/2019 - 10:17am
Distributed Usage Control
Human Factors
Identity management
Interactive Environments
Metrics
pubcrawl
Remote Attestation
Scalability
Smart Assistance Systems
Tamper resistance
Trusted Platform Module
Trusted Reference Monitor
biblio
FADETPM: Novel approach of file assured deletion based on trusted platform module
Submitted by grigby1 on Wed, 09/12/2018 - 10:18am
Business
business risk
Cloud Computing
cloud storage
computer security
computer storage management
computer storage space
cryptographic issues
Cryptography
data deletion
data integrity
data privacy
Ephemerizer
FADE
FADETPM
file access policies
File Assured Deletion
Handheld computers
integrity
internet
Memory
offline data storage
outsourced data files
privacy
pubcrawl
Scalability
SSP
storage management
storage service provider
tpm
Trusted Computing
Trusted Platform Module
VANISH
biblio
Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks
Submitted by grigby1 on Mon, 06/11/2018 - 2:24pm
security
pubcrawl
Resiliency
Scalability
asymmetric key cryptography
Symmetric Key Cryptography
public key cryptography
Conferences
control systems
wireless sensor networks
WSN
private key cryptography
resilience
integrity
Metrics
physical attacks
confidentiality
authenticity
asymmetric key distribution technique
asymmetric key generation
attack resilience
chip-based symmetric key generation
commodity hardware
data freshness
Hierarchical Wireless Sensor Networks
hierarchical wireless sensors networks
key connectivity
Key Distribution
Key Pre-distribution
Pair-wise
security requirement
symmetric key distribution technique
tpm
Trusted Platform Module
network on chip security
1
2
3
next ›
last »