Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 3:05pm
Protocols
zero-knowledge proof
zero trust
UTXO unconsumed model
transaction processing
smart contract address information
smart contract
self-certification
Scalability
Resiliency
resilience
Receivers
Public key
pubcrawl
anonymous improvement scheme
privacy leakage
privacy
policy-based governance
Human Factors
Elliptic curves
data privacy
cryptocurrencies
contracts
blockchain atomic swap
atomic exchange
anonymous scheme
anonymous list
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 2:35pm
noise-like signals
linear combinations
malicious multiple access channels
Mathematical model
multi-access systems
Multimedia communication
multimedia computing
multimedia fingerprinting code
multiple access channel
network coding
Information systems
privacy
pubcrawl
Receivers
resilience
security
security of data
Watermarking
zero-error probability
broadcast channels
Metrics
Resiliency
composability
A-channel
adders
adversarial multiple access channels
arbitrary coefficients
binary adder channel
Binary codes
channel coding
collusion attack
compressed sensing
Conferences
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
encoding
error statistics
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 4:55pm
least significant bit
weak security
unsecured operating systems
uncompensatory loss
tampering counterfeiting
suboptimal multimedia applications
Steganography
Smart Systems
Signal processing algorithms
Scalability
Resiliency
Receivers
public key cryptography
pubcrawl
Metrics
LSB watermarking
banking applications
information security
information cloning
image watermarking
image enhancement
Hill cipher algorithm
Hill Cipher
Elliptic curve cryptography
ECC algorithm
discrete cosine transforms
discrete cosine transform
DCT coefficients
Data Security
Cryptography
Ciphertext
Ciphers
biblio
On Countermeasures Against the Thermal Covert Channel Attacks Targeting Many-core Systems
Submitted by grigby1 on Wed, 02/10/2021 - 12:52pm
Bit error rate
three-step countermeasure
thermal covert channel attacks
Thermal Covert Channel
TCC attack
signal frequency scanning
manycore systems
Many-core systems
dynamic voltage frequency scaling technique
DVFS technique
Defense against Covert Channel Attack
critical defense issue
Multicore processing
signal detection
security of data
covert channels
error statistics
Temperature sensors
Transmitters
Compositionality
Receivers
multiprocessing systems
thermal noise
Scalability
Resiliency
resilience
pubcrawl
biblio
Covert Communication by Exploiting Node Multiplicity and Channel Variations
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
error statistics
wireless broadcast networks
superposition coding
Propagation losses
private message
pre-shared secret
noncovert users
noncovert message
node multiplicity
low probability of detection (LPD)
detection probability
detection error probability
channel variation
covert channels
Information hiding
covert communication
pubcrawl
error probability
covert message
broadcast channels
Transmitters
uncertainty
wireless channels
Compositionality
Receivers
radio networks
Wireless communication
Scalability
telecommunication security
Throughput
Resiliency
resilience
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 12:51pm
lora
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
Chirp
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
Cryptography
Cascading style sheets
Frequency modulation
data encapsulation
covert channels
wireless channels
Compositionality
Receivers
Buildings
Payloads
Scalability
telecommunication security
Resiliency
resilience
pubcrawl
security
biblio
Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels
Submitted by grigby1 on Wed, 02/10/2021 - 12:50pm
discrete memoryless channels
Zinc
unit-rank MIMO
stealth communication
square root law
order-optimal scaling law
multiple-input multiple-output AWGN channels
MIMO AWGN channels
maximal covert coding rate
LPD communication
energy undetectability constraints
effective secrecy
covert nats
blocklength
secrecy capacity
MIMO communication
pubcrawl
AWGN channels
additive white Gaussian noise channels
covert channels
covert communication
physical layer security
channel coding
channel capacity
probability
Compositionality
Receivers
Reliability
Scalability
telecommunication security
Resiliency
resilience
biblio
File Encryption and Decryption Using DNA Technology
Submitted by aekwall on Mon, 02/08/2021 - 1:50pm
deoxyribo nucleic acid sequence
arbitrary keys generation
authorized persons
binary-coded form
common key
cryptographic process
data forwarding
data hijacking
data transmutation
appropriate form
DNA technology
file decryption
file encryption
intermediate steps
original texted message
unknown form
users data security
Cryptography
DNA sequence
DNA cryptography
decryption
encoding
data hiding
Predictive Metrics
public key cryptography
DNA
privacy
pubcrawl
Human behavior
Resiliency
Receivers
Conferences
encryption
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 1:47pm
digital signatures
secure cloud data communication
Receivers
Quantum Key Distribution
quantum computing
public key cryptography
malicious client
Elliptic curves
elliptic curve digital signature algorithm (ECDSA)
elliptic curve digital signature
elliptic curve
Elliptic curve cryptography
data exchange
Cryptographic Protocols
Cloud Computing
BB84
authentication
Metrics
Resiliency
Scalability
pubcrawl
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 1:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
« first
‹ previous
…
6
7
8
9
10
11
12
13
14
…
next ›
last »