Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Using friendly jamming to improve route security and quality in ad hoc networks
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
security performance
pubcrawl
Receivers
Resiliency
route security
Routing
secrecy outage probability
security
Security Metrics
physical layer security technique
service quality metrics
Signal to noise ratio
SOP
telecommunication network reliability
telecommunication network routing
telecommunication security
wireless area network
eavesdroppers
Ad hoc networks
auxiliary variable
composability
connection outage probability
convex optimization problem
convex programming
COP
D2D network
Ad Hoc Network Security
friendly jamming
Human behavior
Human Factors
Interference
Jamming
machine-to-machine communication
Measurement
biblio
Improving physical layer security for wireless ad hoc networks via full-duplex receiver jamming
Submitted by grigby1 on Fri, 02/02/2018 - 12:14pm
Ad Hoc Network Security
composability
High definition video
Human behavior
Human Factors
Jamming
power system reliability
probability
pubcrawl
Receivers
Resiliency
security
Transmitters
biblio
Securing qr codes by rsa on fpga
Submitted by grigby1 on Tue, 01/23/2018 - 1:58pm
Modular Multiplication
XSG
VHDL
RSA
Resiliency
Receivers
QR codes
Public key
pubcrawl
Ciphers
modular exponentiation
image security
FPGA
field programmable gate arrays
encryption
cyber physical systems
Cryptography
biblio
Polar codes for arbitrary classical-quantum channels and arbitrary cq-MACs
Submitted by grigby1 on Tue, 01/16/2018 - 5:36pm
Human Factors
Scalability
Resiliency
Reliability
Receivers
Random variables
quantum successive cancellation decoder
pubcrawl
probability of error
polarization theorems
polar codes
Metrics
arbitrary Abelian group operation
Homomorphic encryption
error statistics
encoding
Electronic mail
deterministic homomorphism channels
Decoding
codes
Arikan-style transformation
arbitrary cq-MAC
arbitrary classical-quantum multiple access channels
biblio
A novel security mechanism using hybrid cryptography algorithms
Submitted by grigby1 on Wed, 01/10/2018 - 11:27am
AES
Algorithm design and analysis
Compositionality
encryption
hash algorithms
Hybrid Cryptography
MD5
Protocols
pubcrawl
Public key
Receivers
Resiliency
RSA
security
biblio
A MIMO cross-layer secure communication scheme based on spatial modulation
Submitted by grigby1 on Wed, 01/10/2018 - 11:21am
multiple input multiple output system
upper layer stream cipher
transmitting antennas
telecommunication security
spatial modulation
security information transmission
security
Resiliency
reception demodulation performance
Receivers
radio reception
pubcrawl
physical layer security
Physical layer
Bit error rate
modulation
MIMO cross-layer secure communication scheme
MIMO communication
MIMO
legitimate user
eavesdropper error rate
distorted signal design
Demodulation
Cryptography
Cross-Layer Security
Cross Layer Security
composability
biblio
Cross MAC/PHY layer security design using ARQ with MRC and adaptive modulation
Submitted by grigby1 on Wed, 01/10/2018 - 11:21am
packet error rate formula
wireless service confidentiality
Wireless communication
telecommunication security
security performance
security
Resiliency
Receivers
Rayleigh fading channel
Rayleigh channels
quality of service
pubcrawl
physical-MAC layer security design
PER formula
adaptive modulation
MRC
modulation
Measurement
maximal ratio combination
fading channels
diversity reception
Decoding
cross MAC-PHY layer security design
Cross Layer Security
composability
Automatic repeat request
ARQ
biblio
Chaotic secure digital communication scheme using auxiliary systems
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
inclusion technique
transmitter side
transmitter parameters
telecommunication security
security
secure message transmission scheme
Resiliency
Receivers
receiver side
radio transmitters
radio receivers
pubcrawl
Observers
observer
modified Henon hyperchaotic discrete-time system
Metrics
auxiliary chaotic systems
hyperchaotic discrete primary chaotic systems
encryption function
encryption
encrypted message
dynamical left inversion technique
discrete time systems
digital signal processing
digital communication
Cryptography
composability
chaotic synchronization
chaotic secure digital communication scheme
chaotic cryptography
chaotic communication
Auxiliary transmitters
biblio
Independent source architecture for developing FPGA-based physical layer security techniques
Submitted by grigby1 on Wed, 12/20/2017 - 11:59am
Bit error rate
signal processing security
Wireless communication
software defined radio
Receivers
random number generation
Physical layer
field programmable gate arrays
Communication Systems Security
Metrics
Generators
Hardware
encryption
Software
composability
privacy
Resiliency
pubcrawl
biblio
Cyber-Secure UAV Communications Using Heuristically Inferred Stochastic Grammars and Hard Real-Time Adaptive Waveform Synthesis and Evolution
Submitted by K_Hooper on Wed, 12/20/2017 - 10:31am
Information Reuse
Waveform Analysis and Synthesis
security
Resiliency
Receivers
real-time systems
pubcrawl
Production
Memory management
Adaptive Programming
Hard Real-Time Systems
grammatical inference
Grammar
Expectation-Driven Receiver
Evolutionary Programming
drones
computer security
Case-Based Reasoning
« first
‹ previous
…
17
18
19
20
21
22
23
24
25
next ›
last »