Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secrecy
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
Semantic Security for Quantum Wiretap Channels
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
Cryptography
telecommunication security
strongly secure code
semantically secure code
semantic security capacity
semantic security
security
secrecy
resilience
quantum wiretap channels
quantum communication
pubcrawl
nonsecure code
Indistinguishability
channel coding
Compositionality
coding theory
classical-quantum channels
classical-quantum
classical channels
capacity
BRI functions
BRI
biregular irreducible functions
biregular irreducible
composability
Resiliency
Metrics
biblio
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
Submitted by aekwall on Mon, 12/07/2020 - 11:25am
symbol manipulation
Predictive Metrics
privacy
pubcrawl
public key cryptography
Resiliency
Scalability
secrecy
secrecy properties
neural style transfer
symbolic analysis
symbolic verification
Tamarin modelling
Tamarin prover
tpm
Trusted Computing
trusted platform module TPM-backed anonymous credentials
trusted platform modules
ECC-based version
authentication
composability
Cryptographic Protocols
cryptographic scheme
cyber-physical system security
digital signatures
direct anonymous attestation
ECC-based direct anonymous attestation
Analytical models
ECC-DAA
expected authentication
formal analysis
formal verification
IEC standards
ISO standards
mechanised analysis
biblio
Information Theoretic Security over α-µ/α-µ Composite Multipath Fading Channel
Submitted by grigby1 on Tue, 06/02/2020 - 10:53am
secrecy matrices
policy-based governance
probability
pubcrawl
Receivers
resilience
Resiliency
Scalability
secrecy
non-zero secrecy capacity
secure outage probability
security
shadowing
Signal to noise ratio
telecommunication security
wireless channel
Wireless communication
α-μ distribution
Human Factors
channel capacity
channel parameters
Communication system security
composite multipath fading channel
confidential information
eavesdropper
fading channels
Human behavior
Capacity planning
Information Leakage
information theoretic security
mathematical expressions
Metrics
Monte Carlo methods
Monte-Carlo simulations
multipath channels
multipath fading
biblio
Ideal complexity cryptosystem with high privacy data service for cloud databases
Submitted by grigby1 on Wed, 09/05/2018 - 9:39am
Databases
storage services
secrecy
Scalability
Safety
Resiliency
resilience
pubcrawl
privacy
metadata
human factor
Human behavior
high privacy data service
encryption techniques
encryption
client data
database management systems
Database as a service
data storage
data privacy
data confidentiality
cryptosystem
Cryptography
Concurrency
Computing Theory
Complexity theory
Cloudcomputing
cloud service provider
cloud databases
Cloud Computing
biblio
Cryptographic protocol for multipart missions involving two independent and distributed decision levels in a military context
Submitted by grigby1 on Wed, 05/16/2018 - 12:47pm
Metrics
security levels
security level
secure protocol
secure cryptographic protocol
secrecy
Resiliency
resilience
Repudiation
pubcrawl
non-repudiation
multipart missions
multipart military missions
military mission
military context
military computing
authentication
man-in-the-middle attack
Logistics
internet
independent distributed decision levels
independent decision
human factor
Human behavior
encryption
distributed decision
digital signatures
decision level
Cryptographic Protocols
cryptographic protocol
critical military missions
composability
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Fri, 05/01/2015 - 7:34am
network capacity
Vectors
Transforms
source rate
secrecy
Robustness
rate-optimal
random linear network coding
random codes
polynomial-time distributed network codes
network coding
Achievable rates
malicious errors
linear codes
Jamming
interior nodes
error probability
error control
eavesdropping
communicating information
communicated message
adversary
biblio
Network Codes Resilient to Jamming and Eavesdropping
Submitted by BrandonB on Thu, 04/30/2015 - 11:45am
network capacity
Vectors
Transforms
source rate
secrecy
Robustness
rate-optimal
random linear network coding
random codes
polynomial-time distributed network codes
network coding
Achievable rates
malicious errors
linear codes
Jamming
interior nodes
error probability
error control
eavesdropping
communicating information
communicated message
adversary