Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Using Perfect Codes in Relay Aided Networks: A Security Analysis
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
Reliability
passive eavesdropping attacks
perfect codes
PHY-layer security approaches
physical layer operations
proper security mechanism
pubcrawl
radio networks
Receivers
relay aided networks
Relays
nonnegotiable concept
reliable intermediate relays
resilience
Resiliency
security
Security analysis
selected FEC scheme
simulations
system operations
wireless channels
distinct requirements
composability
cooperative communication
CPS
CPS modeling
CPS Security
Cryptography
cyber-physical systems
Decoding
decoding frame error rate
communication environments
error injection
error probability
error statistics
FEC codes.
forward error correction
forward error correction schemes
Hamming codes
human lives
Metrics
biblio
Security Aware Spatial Modulation (SA-SM)
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
peak-to-average-power-ratio
forward-error-correction threshold
HN
interchannel interference
Internet-of-Things deployments
MIMO
MIMO communication
MIMO techniques
multiple-input multiple-output techniques
optical transmitters
Peak to average power ratio
degree of technology independent physical layer security
radio range
SA-SM
secure technique
security aware spatial modulation
SM
space division multiplexing
spatial multiplexing
system complexity
visible light range
VLC
error statistics
computer network security
Internet of Things
Receivers
security
Radio frequency
Resiliency
pubcrawl
composability
Metrics
Decoding
IoT
computer network reliability
spectral efficiency
radio receivers
OFDM
forward error correction
adjacent channel interference
arising security concerns
bit-error-rate
communication system capacity
communication system reliability
biblio
Embedding Covert Information on a Given Broadcast Code
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
random codes
information theoretic security
information-theoretic security
Low Probability of Detection
Metrics
necessary conditions
original broadcast communication
policy-based governance
Probability distribution
pubcrawl
Indexes
random coding argument
Random variables
Receivers
resilience
Resiliency
Scalability
stronger receiver
Transmitters
weaker receiver
decoding error probability
Broadcast Channel
broadcast channels
broadcast code
channel capacity
channel coding
covert communication
covert communications
covert message
Decoding
asymptotic fundamental limits
degraded discrete memoryless broadcast channel
DM-BC
embedding covert information
error probability
error statistics
general DM-BCs
Human behavior
Human Factors
biblio
Information Theoretic Security over α-µ/α-µ Composite Multipath Fading Channel
Submitted by grigby1 on Tue, 06/02/2020 - 11:53am
secrecy matrices
policy-based governance
probability
pubcrawl
Receivers
resilience
Resiliency
Scalability
secrecy
non-zero secrecy capacity
secure outage probability
security
shadowing
Signal to noise ratio
telecommunication security
wireless channel
Wireless communication
α-μ distribution
Human Factors
channel capacity
channel parameters
Communication system security
composite multipath fading channel
confidential information
eavesdropper
fading channels
Human behavior
Capacity planning
Information Leakage
information theoretic security
mathematical expressions
Metrics
Monte Carlo methods
Monte-Carlo simulations
multipath channels
multipath fading
biblio
FGAC-NDN: Fine-Grained Access Control for Named Data Networks
Submitted by grigby1 on Fri, 05/29/2020 - 3:54pm
Mobility
telecommunication network routing
specific user
Servers
Scalability
Resiliency
resilience
Receivers
pubcrawl
promising information-centric networking architectures
potential receivers
network architecture
named data networking
Named Data Network Security
named data network
Access Control
internet
Industries
Human behavior
fine-grained access control mechanism
fine-grained access control
FGAC-NDN
desired file
desired content
DBDH assumption
data confidentiality
computer science
cache storage
Bilinear Pairing
authorisation
biblio
FTP-NDN: File Transfer Protocol Based on Re-Encryption for Named Data Network Supporting Nondesignated Receivers
Submitted by aekwall on Tue, 05/26/2020 - 11:10am
nondesignated receivers
data reencryption
file transfer protocol
Formal Security Models
FTP-NDN
named data network
Named Data Networking (NDN)
NDN nodes
network flow requirement
data confidentiality
re-encryption
storage costs
TCP-IP networks
unknown potential receivers
usage amount
users
video services
Named Data Network Security
transport protocols
Scalability
Servers
telecommunication traffic
Cryptography
Access Control
Receivers
Protocols
computer architecture
computer network security
Resiliency
Human behavior
pubcrawl
internet
network traffic
ciphertext transmission
complete secure file transfer protocol
biblio
A Flow-Level Architecture for Balancing Accountability and Privacy
Submitted by aekwall on Mon, 05/11/2020 - 11:28am
privacy
self-certifying identifier
Performance analysis
network flows
multidelegate mechanism
Internet service provider
flow-level architecture
delegate-registry cooperation scheme
accountability
network accountability
internet
Metrics
computer network security
composability
pubcrawl
Resiliency
computer architecture
Trusted Computing
Protocols
security
Receivers
data privacy
IP networks
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
Benefits of Physical Layer Security to Cryptography: Tradeoff and Applications
Submitted by grigby1 on Fri, 04/10/2020 - 12:20pm
physical layer security
wireless communication protocols
typical cryptography
radiocommunication
PLS
Internet of Things applications
initial performance analysis
Force
computational power
classical cryptography
IoT devices
IoT
Ciphers
resilience
Resiliency
Metrics
composability
pubcrawl
Receivers
Protocols
Internet of Things
encryption
Cryptography
biblio
A Novel Physical Layer Security Technique Using Master-Slave Full Duplex Communication
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
omnidirectional antenna
high power signal
Interference
interference masks
Internet-of-Things networks
IoT networks
IoT node
legitimate intended nodes
Master-slave communication
master-slave full duplex communication node
full-duplex manner
omnidirectional antennas
Phase modulation
phase-modulated random key-data generation
physical layer security
physical layer security technique
received signal
receiving antennas
self-interference cancellation
signal transmission
resilience
security
computer network security
computer network reliability
Reliability
Receivers
pubcrawl
composability
Metrics
Resiliency
Internet of Things
BER
Bit error rate
bit-error rate
communication reliability
directional antennas
directive antennas
error statistics
Eve location
full-duplex
« first
‹ previous
…
11
12
13
14
15
16
17
18
19
…
next ›
last »