Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secret key agreement
biblio
Topology-based Secret Key Generation for Underwater Acoustic Networks
Submitted by grigby1 on Fri, 05/06/2022 - 3:25pm
Routing protocols
Underwater security
Sound speed
secret key agreement
Sea measurements
Underwater Networks
underwater acoustic networks
underwater communication
spread spectrum communication
security
Scalability
simulation
Metrics
network topology
Topology
Resiliency
resilience
pubcrawl
biblio
Universal Hashing for Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 3:43pm
Physical layer
wiretap coding
wiretap codes
modular coding schemes
information coding
2-universal hash family
telecommunication services
Random variables
secret key agreement
information theoretic security
Communication channels
encoding
Noise measurement
Scalability
information-theoretic security
information theory
Metrics
Cryptography
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
private key cryptography
biblio
Wireless Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 3:40pm
message protection
fading channels
information-theoretic security
information theoretic security
average secure communication
channel state information
Fading
imperfect channel state information
Information analysis
low-density parity-check (LDPC) codes
secure communication protocol
multilevel coding
optimized low-density parity-check codes
outage probability
Privacy Amplification
quasi static fading channel
secrecy capacity
secret key agreement
Wireless application protocol
Wireless Information-Theoretic Security
Metrics
data privacy
private key cryptography
telecommunication security
Resiliency
Human behavior
pubcrawl
policy-based governance
privacy
Communication system security
Scalability
probability
channel coding
parity check codes
Data Security
information security
wireless channels
protection
wireless channel
secret key generation