Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Secure Mail using Visual Cryptography (SMVC)
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
OpenPGP
wavelet transforms
wavelet transform
wavelet decomposition
visualization
visual cryptography
transmission medium
SMVC
secure mail using visual cryptography
Receivers
receiver side
receipent mail box
public key cryptography
public key based image authentication method
pretty good privacy
personal security
CFB mode encryption
message authentication
low frequency wavelet coefficient
Internet standards
Image Processing
Heuristic algorithms
gray scale image
encryption
Electronic mail
e-mail messaging
dynamic s-box algorithm
data privacy
chaos-based image encryption algorithm
chaos based image encryption algorithm
chaos
biblio
Examining the Effect of Wireless Sensor Network Synchronization on Base Station Anonymity
Submitted by BrandonB on Mon, 05/04/2015 - 2:11pm
synchronisation
WSN topology
wireless sensor networks
wireless sensor network synchronization
Wireless Sensor Network
Wireless communication
traffic analysis techniques
TPSN
timing-synch protocol for sensor networks
telecommunication traffic
telecommunication security
telecommunication network topology
Synchronization
anonymity
sensors
security mechanisms
reference broadcast synchronization
Receivers
RBS
Protocols
network traffic flow
location privacy
evidence theory analysis
data sources
BS anonymity improvement
base station anonymity
biblio
An Approach to Secure Sink Node's Location Privacy in Wireless Sensor Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:51pm
hostile environments
wireless sensor networks
Wireless Sensor Network
Sink node location privacy
shortest path algorithm
security
secure sink node
Receivers
privacy
power consumption
packet delay
location privacy
internal attacks
anonymity
external attacks
environmental monitoring
energy consumption
delays
data gathering
continuous usage
computer science
clustering mechanism
Clustering algorithms
Blast technique
Base stations
biblio
A SDKEY-Based Secure Storage and Transmission Approach for Android Phone
Submitted by BrandonB on Mon, 05/04/2015 - 1:09pm
SDKEY-based transparent encryption storage
PIN
prototype system
public key cryptography
public key exchange
Receivers
SDKEY
SDKEY device
SDKEY-based secure storage
message authentication
secure computation environment
sensitive data leakage
smart phones
storage management
system boot
transmission approach
zero-key exchange
encryption
Android phones
Android system
authentication
Ciphers
data files
Data protection
decryption operation
dual-authentication scheme
Android (operating system)
encryption operation
Encryption Storage
encryption transmission
fine-grained encryption scheme
Key exchange
key exchange mechanisms
lock screen
biblio
Content and network-aware multicast over wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:50am
network coding
wireless networks
wireless mesh networks
video multicast service
video multicast application
Video communication
telecommunication network reliability
Streaming media
redundancy allocation algorithm
Redundancy
Receivers
network-aware multicast communication
network node allocation
Bandwidth
multicast communication
high priority video packet delivery
error prone wireless mesh network
end-to-end performance
delays
data multicast application
data communication
content-aware multicast communication
content and network-aware redundancy allocation
channel status
channel coding
channel bandwidth
biblio
Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming
Submitted by BrandonB on Thu, 04/30/2015 - 2:24pm
spread spectrum systems
primary security threat
probability
radio interference broadcast
radio networks
radiofrequency interference
Receivers
Smart Grid
smart grid application
smart grid communication
Smart Grids
smart power grids
power system security
TACT
telecommunication security
telecommunication traffic
transmitting adaptive camouflage traffic
U-shaped function
well-adopted attack model
wireless communication security
wireless network deployment
wireless networks
worst-case message delay
Jamming
code channel
Communication system security
control messages
cyber-physical system
delay performance guarantee
delays
existing attack model
generic jamming process
information exchange
information technologies
camouflage traffic
jamming attack
jamming attacks
jamming resilience
latency guarantee
message delay minimization
multiple-frequency channel
network load balance
network traffic load
Power distibution
power infrastructures
biblio
Social Engineering in Social Networking Sites: The Art of Impersonation
Submitted by BrandonB on Thu, 04/30/2015 - 1:50pm
social engineering victimization
physical crime
Receivers
security
sexual abuse
SNS
social aspects of automation
social engineering
social engineering traps
Phishing
social engineeringtactics
social networking (online)
Social networking sites
source credibility
threats
Trust management
user susceptibility
attacker
Organizations
large information base
Interviews
information security management
impersonation
identity theft
human behaviors complexity
grounded theory method
fraudulent people
fraud
financial abuse
Facebook
encoding
deceptive people
Computer crime
biblio
Defending network system against IP spoofing based distributed DoS attacks using DPHCF-RTT packet filtering technique
Submitted by BrandonB on Thu, 04/30/2015 - 1:21pm
Intermediate System
TTL
Servers
Round Trip Time (RTT)
Receivers
Probabilistic logic
probabilistic hop count filtering
probabilistic HCF techniques
packet filtering
network bandwidth jam
mitigation techniques
MATLAB 7
IP spoofing
IP networks
IP addresses
Broadband communication
information filtering
illegitimate packet filtering
host resources exhaustion
Hop Count Filtering (HCF)
Hop Count
Educational institutions
DPHCF-RTT packet filtering technique
Distributed Probabilistic HCF (DPHCF)
distributed probabilistic HCF
distributed DoS attacks
DDoS
conventional hop count filtering
conventional HCF techniques
computer network security
biblio
Secure DoF of MIMO Rayleigh block fading wiretap channels with No CSI anywhere
Submitted by BrandonB on Thu, 04/30/2015 - 12:48pm
radio receivers
Upper bound
transmitting antennas
transmitter
telecommunication security
s.d.o.f
receiving antennas
Receivers
receiver
Rayleigh channels
radio transmitters
antennas
multiple input multiple output
MIMO Rayleigh block fading wiretap channels secure DoF
MIMO communication
MIMO
Fading
discrete signalling
degrees of freedom
CSI
Coherence
channel state information
« first
‹ previous
…
17
18
19
20
21
22
23
24
25