Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data communication
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
SMS text Compression and Encryption on Android O.S
Submitted by BrandonB on Mon, 05/04/2015 - 1:08pm
elliptic curve cryptographic technique
SMS text encryption-compression technique
SMS
smart phones
security protocols
public key cryptography
PDA
Mobile handsets
mobile devices
Mobile communication
lossless compression
Look ahead buffer
encryption
Algorithm design and analysis
electronic messaging
ECDSA
Data Transmission
Data Security
data compression
data communication
Cryptographic Protocols
Computers
Bandwidth
Android OS
Android (operating system)
biblio
Content and network-aware multicast over wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 9:50am
network coding
wireless networks
wireless mesh networks
video multicast service
video multicast application
Video communication
telecommunication network reliability
Streaming media
redundancy allocation algorithm
Redundancy
Receivers
network-aware multicast communication
network node allocation
Bandwidth
multicast communication
high priority video packet delivery
error prone wireless mesh network
end-to-end performance
delays
data multicast application
data communication
content-aware multicast communication
content and network-aware redundancy allocation
channel status
channel coding
channel bandwidth
biblio
Intrusion tolerance mechanisms using redundant nodes for wireless sensor networks
Submitted by BrandonB on Thu, 04/30/2015 - 2:54pm
re-route detection
wireless sensor networks
wireless networks
telecommunication traffic
telecommunication security
telecommunication network routing
telecommunication channels
security
Routing
redundant nodes
redundant node
all-channel analyzer
Protocols
Monitoring
intrusion tolerance mechanisms
intrusion tolerance architecture
intrusion tolerance
Intrusion Detection
expert intrusion detection analysis system
data traffic detection
data communication
biblio
A New Efficient and Secure POR Scheme Based on Network Coding
Submitted by BrandonB on Thu, 04/30/2015 - 2:35pm
dispersal code
Silicon
Servers
security of data
secure POR scheme
proof of retrievability
network coding-based POR
network coding
maintenance engineering
maintenance
local data storage
encoding
efficient POR scheme
Availability
Decoding
Data Security
data integrity
data confidentiality
data communication
data checking
data availability
cost reduction
corruption attack prevention
corruption attack
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
7