Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
CodeRepair: PHY-layer partial packet recovery without the pain
Submitted by el_wehby on Fri, 05/25/2018 - 3:49pm
lossy 802.11 links
wireless LAN
single parity code
Reflective binary codes
Receivers
Protocols
practical coding-based protocol
PHY layer
partially corrupted packets
parity check codes
padded parities
packet recovery approaches
OFDM
802.11 networks
IEEE 802.11 Standard
forward error correction
Error Recovery
error correction
error correcting capability
erroneous coded bits
end-to-end link goodput
Decoding
Convolutional codes
convolutional code
CodeRepair
coded bit errors
1536086
biblio
EliMO: Eliminating Channel Feedback from MIMO
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
FTF
wireless LAN
WiFi station
WiFi networks
two-way channel estimation
Throughput
STA
Signal to noise ratio
Receivers
multiple-input multiple-output networks
MIMO communication
MIMO beamforming
MIMO
implicit feedback
access points
feedback training field
explicit feedback
EliMO
downlink training symbols
downlink CSI
Downlink
communication overhead
channel state information feedback
channel feedback elimination
Channel estimation
array signal processing
AP
1536086
biblio
Environment-Aware Indoor Localization Using Magnetic Induction
Submitted by el_wehby on Wed, 05/23/2018 - 6:07pm
Magnetic Induction
wireless networks
wireless applications
Transmitters
transmission media
Receivers
radio networks
radio links
position information
phase shifting
MI-based wireless networks
MI signals
MI communication
Coils
LOS links
line-of-sight links
joint device localization and conductive-object tomography algorithm
indoor navigation
Indoor environments
floor planning
estimation errors
environment-aware indoor localization
electromagnetic induction
Conductivity
conductive walls
complex nonLOS environments
1446484
biblio
Attackers can spoof navigation signals without our knowledge. Here's how to fight back GPS lies
Submitted by el_wehby on Thu, 05/17/2018 - 8:11pm
Boats
CIA
Global Positioning System
GPS system hijack
Iran
marine navigation
Marine vehicles
military aircraft
military GPS signal
navigation signal spoofing
Receivers
Satellite broadcasting
1454474
biblio
Voiceprint: A Novel Sybil Attack Detection Method Based on RSSI for VANETs
Submitted by K_Hooper on Wed, 05/02/2018 - 10:41am
Transportation Systems
Spectrogram
speech processing
Sybil attack
Sybil attack detection method
sybil attacks
testing
Time series analysis
traffic engineering computing
RSSI time series
V2I communications
V2V communications
VANET
vehicle-to-infrastructure communications
vehicle-to-vehicle communications
vehicular ad hoc networks
vehicular speech
Voiceprint
pubcrawl
computer network security
Dynamic Time Warping
Intelligent Transportation Systems
Metrics
mobile computing
Peer-to-peer computing
position estimation
Position measurement
composability
Radio propagation
radio propagation models
Received signal strength indicator
Receivers
Resiliency
road safety
RSSI
biblio
A DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
finite values
fixed sized chunk
Human behavior
Metrics
Paillier
Paillier cryptosystems
plaintext
pubcrawl
equivalent binary value
random processes
random strings
Receivers
resilience
Resiliency
RSA
Transforms
asymmetric cryptosystem
equivalent ASCII values
encryption
encoding
ElGamal cryptosystems
ElGamal
dynamic DNA encoding
DNA cryptography
DNA cryptographic technique
DNA bases
DNA
data secrecy
Compositionality
Ciphertext
biocomputing
Asymmetric Encryption
biblio
BigCrypt for Big Data Encryption
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
Pretty Good Privacy technique
zero tolerance security
symmetric key encryption
storage management
Software
Servers
RSA
Rijndael
Resiliency
resilience
Receivers
Public key
pubcrawl
probability
probabilistic approach
private information
Asymmetric Encryption
Metrics
Human behavior
Hadoop
Hacking
encryption
Data protection
Cryptography
Compositionality
cloud storage
Cloud Computing
BigCrypt
big data encryption
Big Data
asymmetric encryption technique
biblio
Reliable Data Sharing Using Revocable-Storage Identity-Based Encryption in Cloud Storage
Submitted by grigby1 on Mon, 03/19/2018 - 1:36pm
Identity-based encryption
storage management
shared data
security
secure file sharing system
Secure File Sharing
revocation
revocable-storage identity
Resiliency
resilience
reliable data sharing
Receivers
pubcrawl
Metrics
authorisation
Human behavior
encryption scheme
encryption
efficient revocation scheme
data sharing
Cryptography
cryptographically enhanced access control
composability
cloud storage
cloud server
Cloud Computing
authorization
biblio
A Lightweight Multi-receiver Encryption Scheme with Mutual Authentication
Submitted by grigby1 on Wed, 02/21/2018 - 1:46pm
replay-attack prevention
multi-receiver encryption
mutual authentication
pairing operations
performance evaluations
private key cryptography
pubcrawl
Public key
public key cryptography
Receivers
Metrics
resilience
Resiliency
Scalability
Schnorr
Schnorr-like lightweight identity-based partial private keys
sensitive personal data disclosure prevention
source authentication
Trusted Computing
trusted third party
encryption
android encryption
authentication
decryption
device to device communications
device-generated public keys
disclosure range control
Elliptic curves
embedded Android devices
embedded systems
Android (operating system)
Human behavior
Human Factors
implicit user authentication
Internet of Things
IoT (Internet of Things)
IoT applications
lightweight multireceiver encryption
message authentication
message integrity
biblio
Inferring OpenFlow Rules by Active Probing in Software-Defined Networks
Submitted by grigby1 on Tue, 02/06/2018 - 2:05pm
delays
Receivers
Reconnaissance
Resiliency
rule inference
security threats
software defined networking
Software-Defined Networks
telecommunication security
active probing
Apriori algorithm
clustering
control systems
controllers
reactive rules
Denial-of-Service
DoS attacks
inferring sdn by probing and rule extraction
INSPIRE
IP networks
k-means clustering
Network reconnaissance
OpenFlow rules
packet delay time
Probes
Probing
probing packets
pubcrawl
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »