Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure communication
biblio
Key Management for Static Wireless Sensor Networks With Node Adding
Submitted by BrandonB on Wed, 05/06/2015 - 12:44pm
random processes
wireless sensor networks (WSNs)
wireless sensor networks
transitory master key
telecommunication security
telecommunication network management
symmetric key management scheme
symmetric encryption
static wireless sensor network
security threat
secure communication
random seed distribution
Cryptographic Protocols
random key distribution
Protocols
protocol
Materials
Knowledge engineering
key management
Informatics
hardware tampering
eavesdropping
Cryptography
biblio
Secure fault tolerance mechanism of wireless Ad-Hoc networks with mobile agents
Submitted by BrandonB on Wed, 05/06/2015 - 8:01am
related works
wireless self-organization networks
wireless ad hoc networks
unauthorized attempts
telecommunication security
telecommunication network reliability
signal processing
security threats
security reliability
security precautions
secure mobile agent
secure fault tolerance
secure communication
Ad hoc networks
mobile nodes
mobile agents
mobile agent migration
mobile agent
mobile ad hoc networks
Fault tolerant systems
fault tolerance
fault masking
Erbium
dynamic self-organization networks
Conferences
Ad-Hoc Network
biblio
Moving-target defense mechanisms against source-selective jamming attacks in tactical cognitive radio MANETs
Submitted by BrandonB on Tue, 05/05/2015 - 10:18am
moving target defense mechanism
Wireless communication
telecommunication network reliability
tactical cognitive radio MANET
source selective jamming attack combation
source selective jammer block transmission
source MAC address
secure communication
seamless communication
reliable communication
random address assignment
probability
parameter selection
Ad hoc networks
mobile computing
mobile ad hoc networks
military communication
Jamming
interference suppression
flipped address mechanism
delays
computer network security
Communication system security
cognitive radio
address manipulation
biblio
Anonymous and Secure Communication Protocol for Cognitive Radio Ad Hoc Networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:14pm
network throughput
wireless communication media
telecommunication security
spectrum sensing
spectrum resource scarcity
spectrum allocation
source node
security aspect
secure communication
secure anonymous routing
Routing protocols
Routing
Protocols
privacy
pairing-based cryptography
operational aspect
Ad hoc networks
location anonymity
Energy Efficiency
end-to-end delay
disaster recovery communication network
destination node
Cryptography
Cryptographic Protocols
CRAN
CR media
CR ad hoc networks
cognitive radio ad hoc networks
cognitive radio (CR) networks
cognitive radio
anonymous-secure communication protocol
anonymous routing
biblio
Scaling laws for secrecy capacity in cooperative wireless networks
Submitted by BrandonB on Fri, 05/01/2015 - 7:33am
path loss exponent
Wyner randomized encoder
wireless networks
Transmitters
Tin
telecommunication security
serial block Markov scheme
secure communication
secrecy capacity
scaling laws
Relays
relay networks (telecommunication)
active cooperative relaying
parallel relaying scheme
Markov processes
interference limited communications
interference (signal)
encoding
cooperative wireless networks
cooperative communication
beamforming
array signal processing
Aggregates
« first
‹ previous
1
2
3
4
5