Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Decoding
biblio
Cryptanalysis of a One-Time Code-Based Digital Signature Scheme
Submitted by aekwall on Mon, 06/22/2020 - 10:26am
Complexity theory
one-time code-based digital signature scheme
key recovery attack
information set decoding
code-based cryptography
attack complexity
cryptanalysis
Hamming weight
Secret key
Scalability
statistical analysis
public key cryptography
digital signatures
Decoding
Cryptography
pubcrawl
Resiliency
biblio
Code-Based Schemes for Post-Quantum Digital Signatures
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
Complexity theory
quantum security
post-quantum digital signatures
electronic digital signature
code-based schemes
code-based cryptography
CFS scheme
quantum computing
Post-quantum cryptography
Scalability
quantum cryptography
public key cryptography
Public key
digital signatures
Decoding
pubcrawl
Resiliency
digital signature
biblio
Digital-Domain Dual Encryption Key-Based Phase Shift Symbol Masking with Cascaded Encoder/Decoder for Secure Coherent Optical Systems
Submitted by grigby1 on Fri, 06/19/2020 - 10:33am
forward error correction
telecommunication security
SSMF transmission
secure coherent optical systems
Resiliency
resilience
quadrature phase shift keying
pubcrawl
optical modulation
optical fibre communication
Metrics
cascaded decoder
FEC limit
error statistics
encoding
dual encryption-key-based digital-domain symbol masking
digital-domain dual encryption key-based phase shift symbol masking
Decoding
Cryptography
composability
coherent QPSK system
cascaded encoder
biblio
Using Perfect Codes in Relay Aided Networks: A Security Analysis
Submitted by grigby1 on Fri, 06/19/2020 - 10:33am
Reliability
passive eavesdropping attacks
perfect codes
PHY-layer security approaches
physical layer operations
proper security mechanism
pubcrawl
radio networks
Receivers
relay aided networks
Relays
nonnegotiable concept
reliable intermediate relays
resilience
Resiliency
security
Security analysis
selected FEC scheme
simulations
system operations
wireless channels
distinct requirements
composability
cooperative communication
CPS
CPS modeling
CPS Security
Cryptography
cyber-physical systems
Decoding
decoding frame error rate
communication environments
error injection
error probability
error statistics
FEC codes.
forward error correction
forward error correction schemes
Hamming codes
human lives
Metrics
biblio
Security Aware Spatial Modulation (SA-SM)
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
peak-to-average-power-ratio
forward-error-correction threshold
HN
interchannel interference
Internet-of-Things deployments
MIMO
MIMO communication
MIMO techniques
multiple-input multiple-output techniques
optical transmitters
Peak to average power ratio
degree of technology independent physical layer security
radio range
SA-SM
secure technique
security aware spatial modulation
SM
space division multiplexing
spatial multiplexing
system complexity
visible light range
VLC
error statistics
computer network security
Internet of Things
Receivers
security
Radio frequency
Resiliency
pubcrawl
composability
Metrics
Decoding
IoT
computer network reliability
spectral efficiency
radio receivers
OFDM
forward error correction
adjacent channel interference
arising security concerns
bit-error-rate
communication system capacity
communication system reliability
biblio
Evolving AL-FEC Application Towards 5G NGMN
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
mobile multicast services
arbitrary packet losses
deterministic algorithms
error control
error protection schemes
FEC error control method
feedback free error recovery method
fifth generation mobile technology
forward error correction codes
Application Layer FEC codes
mobile multicast standards
mobile users
multicast communication
Multimedia communication
next generation mobilenetwork
online algorithms
randomized online algorithms
redundant data
source data
pubcrawl
composability
Metrics
Decoding
5G mobile communication
ultra-high reliability
next generation networks
encoding
Resiliency
telecommunication network reliability
forward error correction
Packet loss
5G Next Generation Mobile Networks
5G NGMN
AL-FEC policy online problem
AL-FEC protection
biblio
Design and Implementation of Secure and Encoded Data Transmission Using Turbo Codes
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
Maximum log-map algorithm
Viterbi algorithm
Turbo Encoder
Turbo Decoder
turbo codes
text encoding
text decoding
telecommunication security
Shannonlimit
secure data transmission
Resiliency
Recursive systematic convolutional encoder
pubcrawl
parity check codes
noisy data
Metrics
channel capacity
Maximum likelihood decoding
iterative decoding
Interleaver
image encoding
image decoding
Image coding
forward error correction method
forward error correction
error detection
error correction codes
encoded data transmission
deinterleaver
Decoding
Convolutional codes
composability
biblio
Composable, Unconditionally Secure Message Authentication without any Secret Key
Submitted by grigby1 on Tue, 06/02/2020 - 10:55am
message authentication
secure message authentication
Scalability
Resiliency
resilience
pubcrawl
Protocols
probability
policy-based governance
Noise measurement
Metrics
authentication
information theoretic security
Human Factors
Human behavior
error correction codes
error correction
encoding
Decoding
Cryptography
Cryptographic Protocols
channel coding
biblio
Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Submitted by grigby1 on Tue, 06/02/2020 - 10:54am
source coding
pubcrawl
public channel
public key cryptography
Relays
resilience
Resiliency
Scalability
secret keys
security
policy-based governance
source coding scheme
source sequences
source-type model
telecommunication security
Telecommunications
trusted helper
untrusted helper
Upper bound
Indexes
cooperative communication
cooperative key generation
cooperative two-key generation
Decoding
discrete memoryless sources
five-terminal system
generated keys
Human behavior
Human Factors
channel capacity
information theoretic security
information-theoretic security
key capacity region
key leakage rate
Metrics
partial-trusted helpers
passive eavesdropper
physical layer security
biblio
Embedding Covert Information on a Given Broadcast Code
Submitted by grigby1 on Tue, 06/02/2020 - 10:54am
random codes
information theoretic security
information-theoretic security
Low Probability of Detection
Metrics
necessary conditions
original broadcast communication
policy-based governance
Probability distribution
pubcrawl
Indexes
random coding argument
Random variables
Receivers
resilience
Resiliency
Scalability
stronger receiver
Transmitters
weaker receiver
decoding error probability
Broadcast Channel
broadcast channels
broadcast code
channel capacity
channel coding
covert communication
covert communications
covert message
Decoding
asymptotic fundamental limits
degraded discrete memoryless broadcast channel
DM-BC
embedding covert information
error probability
error statistics
general DM-BCs
Human behavior
Human Factors
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »