Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Upper bound
biblio
Decoding of Interleaved Linearized Reed-Solomon Codes with Applications to Network Coding
Submitted by aekwall on Tue, 03/01/2022 - 3:26pm
simulation
pubcrawl
Resiliency
composability
Probabilistic logic
cyber-physical systems
Decoding
Predictive Metrics
Reed-Solomon codes
Upper bound
network coding
error correction
multishot network coding
multishot operator channel
subspace codes
sum-rank metric
biblio
Secure Key Exchange by NFC for Instant Messaging
Submitted by grigby1 on Mon, 01/10/2022 - 11:16am
operating systems
Upper bound
standards
Servers
Scalability
Resiliency
resilience
pubcrawl
Protocols
android encryption
Metrics
man-in-the-middle attack
Key exchange
Instant messaging
Human behavior
End-End Encryption
encryption
Elliptic Curve Diffie-Hellman
biblio
On the Connectivity and Giant Component Size of Random K-out Graphs Under Randomly Deleted Nodes
Submitted by grigby1 on Tue, 12/21/2021 - 9:19am
random K-out graphs
wireless sensor networks
Upper bound
security
Scalability
Routing
Robustness
Resiliency
resilience
Ad hoc networks
random graphs
pubcrawl
privacy
giant component
Cryptography
connectivity
Computer simulation
anonymous messaging
biblio
Anonymous Mutual Authentication: An Information Theoretic Framework
Submitted by grigby1 on Tue, 12/21/2021 - 9:18am
anonymous messaging
authentication
Conferences
Galois fields
Law
Measurement
pubcrawl
reliability theory
resilience
Resiliency
Scalability
Upper bound
biblio
Adversary Instantiation: Lower Bounds for Differentially Private Machine Learning
Submitted by aekwall on Mon, 12/20/2021 - 11:30am
differential privacy
Adversary Models
Upper bound
Toxicology
Membership-Inference
machine-learning
DP-SGD
Differentially-private-(DP)-machine-learning
Differentially-private
Deep-learning
privacy
Human behavior
Resiliency
Metrics
Scalability
pubcrawl
Games
Training
deep learning
biblio
An Optimized Structure of State Channel Network to Improve Scalability of Blockchain Algorithms
Submitted by grigby1 on Tue, 05/25/2021 - 2:24pm
information security
Upper bound
state channel
second layer network
Scalability
Routing
Resilient
resilience
pubcrawl
Metrics
Lightning Network
blockchain
Human Factors
Human behavior
cryptology
Cryptography
cryptocurrency
composability
collaboration
channel capacity
blockchain scalability
biblio
General Knapsack Bounds of Web Caching Performance Regarding the Properties of each Cacheable Object
Submitted by aekwall on Tue, 05/18/2021 - 2:22pm
Clocks
Web Caching
LRU
LFU
knapsack bounds
GreedyDual and score-gated web cache strategies
FIFO
cache hit& value ratio
Upper bound
Scalability
Markov processes
quality of service
delays
Market research
optimization
Metrics
pubcrawl
Resiliency
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 3:40pm
error correction codes
pollution attack
Pollution
network error correction
network coding security
information-theoretic approach
Information rates
cryptographic signature
cryptographic approach
information theoretic security
multicast communication
Upper bound
error correction
network coding
Scalability
computer networks
information security
information theory
Metrics
Cryptography
wireless sensor networks
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
biblio
TMVP-Friendly Primes for Efficient Elliptic Curve Cryptography
Submitted by aekwall on Mon, 02/15/2021 - 3:54pm
Scalability
Resiliency
pubcrawl
Cryptography
Metrics
NIST
Elliptic curve cryptography
Elliptic curves
information security
Registers
Upper bound
Finite field multiplication
Montgomery curves
Toeplitz-matrix vector product
biblio
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes
Submitted by grigby1 on Fri, 09/18/2020 - 12:47pm
Upper bound
secure exact-repair regenerating codes
secure determinant codes
repair bandwidth
per-node storage
information-theoretic secrecy
Distributed storage system
codes
Manganese
linear codes
coding theory
information theory
security of data
Compositionality
Bandwidth
Metrics
Redundancy
maintenance engineering
storage management
Cryptography
Resiliency
resilience
pubcrawl
security
« first
‹ previous
1
2
3
4
next ›
last »