Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
channel coding
biblio
Physical layer security using BCH and LDPC codes with adaptive granular HARQ
Submitted by grigby1 on Fri, 10/26/2018 - 3:51pm
reliable transmission
LDPC codes
legitimate channel
legitimate receiver
legitimate recipient request
parity check codes
physical layer security
pubcrawl
received symbols likelihood computations
Receivers
Reliability
intended receiver
Resiliency
retransmitted packets
Scalability
secure transmission
security
Signal to noise ratio
telecommunication security
transmission techniques
wireless communications systems
decoding process
additive noise Gaussian wiretap channel
Automatic repeat request
BCH codes
better channel conditions
channel capacity
channel codes
channel coding
coded packets
Conferences
Decoding
adaptive granular HARQ
eavesdropper
equal channel conditions
error correction codes
error statistics
feedback transmitted packets
forward error correction
granular subpackets
HARQ retransmission requests
hybrid automatic repeat-request protocol
biblio
Smart and secure data storage using Encrypt-interleaving
Submitted by grigby1 on Wed, 01/10/2018 - 11:38am
Human behavior
unsecure channel
turbo codes
Resiliency
public key cryptography
pubcrawl
private key cryptography
privacy
Policy
Human Factors
channel coding
encryption
encrypt-interleaving
data storage
Data Sanitization
Convolutional codes
Compositionality
collaboration
Cloud Security
Cloud Computing
biblio
A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Human Factors
wireless sensor networks
Sensor Systems
secure provenance
Resiliency
public key cryptography
pubcrawl
Provenance
Metrics
map-reduce
arithmetic coding techniques
Human behavior
encryption
drones
Data models
Compositionality
composability
channel coding
big-data
biblio
SBN: Simple Block Nanocode for Nanocommunications
Submitted by grigby1 on Tue, 09/19/2017 - 11:21am
channel coding
composability
forward error correction
Metrics
pubcrawl
Resiliency
security
biblio
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers
Submitted by grigby1 on Tue, 09/19/2017 - 11:21am
3D printing
channel coding
composability
Metrics
pubcrawl
Resiliency
Side-channel attack
smartphone
biblio
Cross Layer Approach Energy Efficient Transmission of Multimedia Data over Wireless Sensor Networks
Submitted by grigby1 on Tue, 09/19/2017 - 11:21am
channel coding
composability
cross layer approach
Energy Efficiency
Metrics
processor power
pubcrawl
Resiliency
Selective Encryption
video coding
Wireless sensor networks: H.264 compression
biblio
Preventing Page Faults from Telling Your Secrets
Submitted by grigby1 on Tue, 09/19/2017 - 11:21am
channel coding
composability
defense
Hardware Security
Intel SGX
Metrics
pubcrawl
Resiliency
side-channel
biblio
ParTI: Towards Combined Hardware Countermeasures Against Side-Channeland Fault-Injection Attacks
Submitted by grigby1 on Fri, 09/15/2017 - 10:01am
channel coding
error-detecting codes
Fault injection
Lightweight Ciphers
pubcrawl
Resiliency
side-channel analysis
threshold implementation
biblio
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency
Submitted by grigby1 on Mon, 05/22/2017 - 12:58pm
channel coding
collaboration
consistency
distributed systems
Human Factors
Information Flow
language-based security
Metrics
pubcrawl
Resiliency
safe coding standards
security
serializability
transactions
biblio
A Design and Verification Methodology for Secure Isolated Regions
Submitted by grigby1 on Mon, 05/22/2017 - 12:42pm
channel coding
composability
confidentiality
confinement
Enclave Programs
formal verification
Human behavior
pubcrawl
Resiliency
Secure computation
Securing Compilers
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »