Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
eavesdropping
biblio
Impact of Minimizing the Eavesdropping Risks on Lifetime of Underwater Acoustic Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 2:59pm
pubcrawl
Underwater Networks
Underwater acoustics
underwater acoustic sensor networks
underwater
security
Scalability
Resiliency
resilience
Receivers
batteries
optimization
Numerical models
network lifetime
Metrics
Linear programming
Energy Efficiency
eavesdropping attack
eavesdropping
Cyber Physical System
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
legitimate receiver
Wireless communication
wireless channels
transmitter transmission efficiency
transmission efficiency
telecommunication security
simulation
security
secure transmission scheme
safe transmission
Resiliency
Receivers
pubcrawl
Metrics
Safe Coding
intercept probability
high efficiency fountain code
Fountain codes
encoding
efficient transmission fountain code
efficient coding scheme
eavesdropping
Decoding
Data Transmission
data security transmission scheme
composability
Communication system security
channel coding
biblio
P4NIS: Improving network immunity against eavesdropping with programmable data planes
Submitted by grigby1 on Tue, 03/09/2021 - 2:40pm
Servers
P4NIS
packet classification
performance evaluation
policy-based governance
programmable data planes
programming protocol-independent packet processor based network immune scheme
Protocols
pubcrawl
network paths
single network path
supercomputer computational capacity
telecommunication traffic
three lines of defense
traffic packets
transmission port field encryption
versatile attackers
encryption-based countermeasures
brute-force attacks
computer network security
Cryptography
diverse encryption algorithms
eavesdropping
eavesdropping attacks
encrypted packet transmission
encryption
brute force attacks
Human behavior
Human Factors
internet
Internet Protocol
IP
IP networks
network immunity
biblio
Quantum Low Probability of Intercept
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
Metropolitan area networks
telecommunication security
Resiliency
resilience
Receivers
quantum low probability of intercept
pubcrawl
probability
Photonics
optical fibre networks
optical fiber
OCIS codes
Monitoring
metropolitan-area distances
(060.1660) Coherent communications
Metrics
forward error correction
error probability
eavesdropping
eavesdropper
decryption key
Cryptography
composability
Ciphertext
Brightness
(270.5568) Quantum cryptography
(270.5565) Quantum communications
biblio
Proving Erasure
Submitted by grigby1 on Tue, 06/02/2020 - 11:55am
privacy amplification.
users
storage management
Servers
server hosting data
Scalability
Resiliency
resilience
remote hosting service
remote data storage
Quantum mechanics
quantum cryptography
pubcrawl
provable deletion
Protocols
privacy delegation
data deletion
policy-based governance
Metrics
information-theoretically
information-theoretic security
information theoretic security
Human Factors
Human behavior
encryption
eavesdropping
definite deletion
data storage
data privacy
Cryptography
BB84-like protocol
biblio
New Quantum Secret Sharing Protocol Using Entangled Qutrits
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
Communication channels
quantum computing security
security amplification
quantum secure direct communication
quantum secret sharing protocol
Quantum secret sharing
quantum memory
ping-pong protocol
Optimized production technology
entangled qutrits
entangled qubits
eavesdropping attack
detection of eavesdropping
Scalability
Quantum entanglement
Predictive Metrics
quantum cryptography
quantum computing
Cryptography
composability
pubcrawl
Resiliency
eavesdropping
Protocols
telecommunication security
biblio
A High-Speed Key Management Method for Quantum Key Distribution Network
Submitted by grigby1 on Mon, 01/27/2020 - 12:27pm
quantum key distribution network
one-time pad tunnel manager
Photonics
private key cryptography
pubcrawl
public key cryptography
QKD key generation
QKD network
quantum cryptography
Quantum Key Distribution
one-time pad
Receivers
resilience
Resiliency
Scalability
secure communication
transparent encryption link
unconditional secure communication
Web API
high-speed key management method
application communication
application key consumption
application program interfaces
data communication
eavesdropping
encryption
encryption key sharing
global key manager
adjacent nodes
high-speed method
high-speed QKD system
Human behavior
Human Factors
key management
local key manager
Metrics
network systems
biblio
A Secure Voice Channel using Chaotic Cryptography Algorithm
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
secure voice channel
communicaiton channel prototype
decryption process
encrypted channel
encryption process
encryption-decription cycle
FPGA Spartan-3
high processing speed
nonecrypted channel
Cipher feedback mode
secure voice communications channel
secured channel
secured communication channel
Spartan-3 FPGA board
time 202.0 mus
unwanted eavesdropping
voice communication
voice messages
Ciphers
Cryptography
encryption
Receivers
telecommunication security
eavesdropping
Resiliency
pubcrawl
composability
field programmable gate arrays
Predictive Metrics
chaotic communication
asynchronous communication
chaotic cryptographic algorithm
chaotic cryptography
chaotic cryptography algorithm
chiper feedback
biblio
Modified Cooperative Bait Detection Scheme for Detecting and Preventing Cooperative Blackhole and Eavesdropping Attacks in MANET
Submitted by aekwall on Mon, 06/10/2019 - 10:14am
routing overhead
mobile ad-hoc network
network throughput
node mobility
packet delivery ratio
passive attacks
pubcrawl
public key cryptography
Resiliency
Routing
mobile ad hoc networks
Routing protocols
RSA
RSA encryption technique
signal detection
telecommunication network routing
telecommunication network topology
telecommunication security
wireless mobile nodes
eavesdropping attacks
black hole
CBDS
composability
cooperative bait detection scheme
cooperative blackhole
cooperative communication
data packet
dynamic topological changes
eavesdropping
active attacks
encryption
end to end delay
false routing information
malicious nodes
MANET
MANET Attack Detection
MANETs
Metrics
biblio
A Proposed Security Evaluation Method for Bluetooth E0Based on Fuzzy Logic
Submitted by aekwall on Mon, 04/01/2019 - 10:06am
Fuzzy logic
transmitted data
telecommunication security
security level
security evaluation method
secure communication
Resiliency
pubcrawl
Human behavior
Fuzzy sets
fuzzy set theory
fuzzy logic technique
attacks
Entropy
encryption
eavesdropping
E0
cryptosystem designers
Cryptography
Correlation
composability
bluetooth security
Bluetooth E0encryption system
Bluetooth
« first
‹ previous
1
2
3
4
next ›
last »