Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encoding
biblio
Scaling laws for secrecy capacity in cooperative wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 8:33am
path loss exponent
Wyner randomized encoder
wireless networks
Transmitters
Tin
telecommunication security
serial block Markov scheme
secure communication
secrecy capacity
scaling laws
Relays
relay networks (telecommunication)
active cooperative relaying
parallel relaying scheme
Markov processes
interference limited communications
interference (signal)
encoding
cooperative wireless networks
cooperative communication
beamforming
array signal processing
Aggregates
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Fri, 05/01/2015 - 8:32am
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
biblio
A New Efficient and Secure POR Scheme Based on Network Coding
Submitted by BrandonB on Thu, 04/30/2015 - 2:35pm
dispersal code
Silicon
Servers
security of data
secure POR scheme
proof of retrievability
network coding-based POR
network coding
maintenance engineering
maintenance
local data storage
encoding
efficient POR scheme
Availability
Decoding
Data Security
data integrity
data confidentiality
data communication
data checking
data availability
cost reduction
corruption attack prevention
corruption attack
Cloud Computing
biblio
Social Engineering in Social Networking Sites: The Art of Impersonation
Submitted by BrandonB on Thu, 04/30/2015 - 1:50pm
social engineering victimization
physical crime
Receivers
security
sexual abuse
SNS
social aspects of automation
social engineering
social engineering traps
Phishing
social engineeringtactics
social networking (online)
Social networking sites
source credibility
threats
Trust management
user susceptibility
attacker
Organizations
large information base
Interviews
information security management
impersonation
identity theft
human behaviors complexity
grounded theory method
fraudulent people
fraud
financial abuse
Facebook
encoding
deceptive people
Computer crime
biblio
Optimality of the product-matrix construction for secure MSR regenerating codes
Submitted by BrandonB on Thu, 04/30/2015 - 12:40pm
MSR point
Upper bound
security
Secure regenerating codes
secure MSR regenerating codes
repair traffic
regenerating codes
Random variables
product-matrix construction
product matrix construction
product matrix
Bandwidth
MSR codes
minimum storage regenerating point
matrix algebra
maintenance engineering
exact repair regenerating code security
Entropy
encoding
eavesdropper
data file
Data collection
« first
‹ previous
…
19
20
21
22
23
24
25
26
27