Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
public channel
biblio
Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
source coding
pubcrawl
public channel
public key cryptography
Relays
resilience
Resiliency
Scalability
secret keys
security
policy-based governance
source coding scheme
source sequences
source-type model
telecommunication security
Telecommunications
trusted helper
untrusted helper
Upper bound
Indexes
cooperative communication
cooperative key generation
cooperative two-key generation
Decoding
discrete memoryless sources
five-terminal system
generated keys
Human behavior
Human Factors
channel capacity
information theoretic security
information-theoretic security
key capacity region
key leakage rate
Metrics
partial-trusted helpers
passive eavesdropper
physical layer security
biblio
"Algorithm for secure visual communication"
Submitted by grigby1 on Tue, 02/14/2017 - 12:33pm
RC4
XOR operation
video encryption
video data transmission
video data storage space
video data handling
video conference
Video communication
video coding
teleconferencing
telecommunication security
telecommunication network reliability
symmetric hierarchical encryption
Streaming media
Signal processing algorithms
secure visual communication
Ciphers
public channel
pubcrawl170102
privacy
network bandwidth availability
multimedia encryption scheme
Multimedia communication
malicious intervention
lightweight selective encryption algorithm
H.264/AVC
GDH.3
entropy coding
encryption
economic utilization
data privacy
Cryptography
biblio
Secret key generation in correlated multi-dimensional Gaussian channels
Submitted by BrandonB on Fri, 05/01/2015 - 8:35am
secret key generation
wireless networks
Wireless communication
wireless channels
wireless channel reciprocity
wide-sense stationary wireless channels
Time-frequency Analysis
time-domain analysis
time selectivity
time domains
telecommunication security
spatial domains
spatial correlation
signal-to-noise ratio
Signal to noise ratio
security
analytical framework
radio networks
public key cryptography
public channel
multiple antenna eavesdroppers
intrinsic secrecy content
Gaussian channels
frequency-domain analysis
frequency domains
Covariance matrices
correlated multidimensional Gaussian channels
confidential communications
Communication system security
asymptotic analysis
antenna arrays