Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Breaking and (Partially) Fixing Provably Secure Onion Routing
Submitted by aekwall on Tue, 04/27/2021 - 1:14pm
provable security
Resiliency
Predictive Metrics
Compositionality
composability
Cryptography
privacy
Protocols
pubcrawl
Receivers
Relays
Routing
biblio
An Improved BICM-ID Receiver for the Time-Varying Underwater Acoustic Communications with DDPSK Modulation
Submitted by grigby1 on Fri, 04/09/2021 - 11:34am
improved bit-interleaved
acoustic communications
BICM-ID algorithm
DDPSK demodulator
DDPSK modulation
differential phase shift keying
Doppler shift
Doppler shifts
double differential phase shift
improved BICM-ID receiver
7.4 dB gain
interleaved codes
noise figure 10.2 dB
noise figure 7.4 dB
novel receiver architecture
phase noise
signal-to-noise ratio loss
SNR loss
underwater acoustic DSSS communications
modulation coding
Resiliency
Signal to noise ratio
composability
Receivers
Decoding
resilience
IDS
multipath channels
error statistics
pubcrawl
Phase shift keying
iterative decoding
underwater acoustic communication
Underwater acoustics
Demodulation
radio receivers
spread spectrum communication
10.2 dB gain
biblio
Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain
Submitted by grigby1 on Fri, 04/09/2021 - 11:23am
Receivers
man-in-the-middle attack
man-in-the-middle attacks
Metrics
personal data disclosure
personally identifiable information
PII
policy-based governance
privacy
pubcrawl
Python
Information Assurance
reputation
resilience
Resiliency
Scalability
Self-Sovereign Identity
self-sovereign identity agents
Sensitivity
user autonomy
user immutability
Data disclosure
attribute sensitivity score model
authorisation
blockchain
blockchains
collaboration
composability
confidence level
credential exchange
credential exchanges
attribute sensitivity
data privacy
distributed ledger
Engines
Human behavior
Hyperledger Indy
Hyperledger Indy blockchain
identity holders
identity operations
identity owners
biblio
Universal Hashing for Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:43pm
Physical layer
wiretap coding
wiretap codes
modular coding schemes
information coding
2-universal hash family
telecommunication services
Random variables
secret key agreement
information theoretic security
Communication channels
encoding
Noise measurement
Scalability
information-theoretic security
information theory
Metrics
Cryptography
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
private key cryptography
biblio
Wireless Information-Theoretic Security for moving users in autonomic networks
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
probability
information theoretic security
Wireless Information-Theoretic Security
wireless information theoretic security
secrecy capacity
outage secrecy capacity
nonzero secrecy capacity
moving users
low speed mobility
autonomic networks
Physical layer
Rayleigh fading
Transmitters
radio access networks
security of data
Signal to noise ratio
Capacity planning
Metrics
Wireless communication
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
Scalability
biblio
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:38pm
Performance Metrics
information theoretic security
standard authentication tags generation
Rijndael cipher
quantization
packet-based transmission
message authentication codes
Information-theoretic authentication codes
false acceptance probability
conditional equivocation
complexity-theoretic MAC
completeness error
channel coding and decoding
artificial-noise-aided message authentication codes
ANA-MAC
cryptographic primitive
Scalability
key recovery attack
Transmitters
Physical layer
information-theoretic security
channel coding
message authentication
information theory
authentication
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Receivers
Cryptography
biblio
Ultimate Secrecy in Cooperative and Multi-hop Wireless Communications
Submitted by aekwall on Thu, 04/08/2021 - 4:33pm
attenuation
ultimate secrecy ranges
short-range wireless communication systems
point-to-point channel
multihop channel measurements
indoor communication systems
in-device communication systems
frequency 550.0 GHz to 565.0 GHz
cooperative wireless communications
chip-to-chip communications
millimetre wave communication
Information Reuse and Security
frequency reuse
communication secrecy
Receivers
communication channel
radio transmitters
communication security
wireless channels
Compositionality
cooperative communication
Relays
Bandwidth
channel capacity
pubcrawl
Resiliency
security
telecommunication security
biblio
A Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
legitimate receiver
Wireless communication
wireless channels
transmitter transmission efficiency
transmission efficiency
telecommunication security
simulation
security
secure transmission scheme
safe transmission
Resiliency
Receivers
pubcrawl
Metrics
Safe Coding
intercept probability
high efficiency fountain code
Fountain codes
encoding
efficient transmission fountain code
efficient coding scheme
eavesdropping
Decoding
Data Transmission
data security transmission scheme
composability
Communication system security
channel coding
biblio
Promising Bio-Authentication Scheme to Protect Documents for E2E S2S in IoT-Cloud
Submitted by grigby1 on Tue, 03/09/2021 - 3:02pm
pubcrawl
IoTs-Cloud
key agreement
local binary pattern
LSB
message authentication
Metrics
one-time bio-key
one-time message-image document code
one-time random pixel sequence
IoT-cloud
Receivers
resilience
Resiliency
robust message anonymity
Scalability
security
Security analysis
smart devices
Watermarking
document image processing
Bio- MAC
bio-authentication scheme
bio-key management
biometrics (access control)
BIOS
Cloud Computing
Cryptography
data integrity
disappearing authentication code
authentication
documents protection
E2E S2S
feature extraction
handwritten character recognition
handwritten feature extraction
Handwritten Signature
HMAC-SHA-256
Human behavior
Internet of Things
biblio
A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network
Submitted by grigby1 on Tue, 03/09/2021 - 2:48pm
LN community
wormhole attack
sensitive payment information
security vulnerabilities
security
Scalability
Receivers
quantitative analysis
pubcrawl
privacy
permissionless decentralized cryptocurrencies
payment channel networks
network-wide DoS attack costs
multihop payment protocols
anonymity
Lightning Network
Lightning
Human behavior
denial-of-service attacks
data privacy
Cryptographic Protocols
cryptocurrencies
contracts
concurrent payments
computer network security
channel capacity
bitcoin
anonymity issues
« first
‹ previous
…
5
6
7
8
9
10
11
12
13
…
next ›
last »