Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
coding theory
biblio
Secure Network and Index Coding Equivalence: The Last Piece of the Puzzle
Submitted by grigby1 on Tue, 12/15/2020 - 1:28pm
nonzero decoding error
telecommunication security
security
secure network coding
secure index coding
Resiliency
resilience
pubcrawl
nonzero leakage
coding theory
network coding
Metrics
index coding equivalence
eavesdropper presence
Decoding
Cryptography
constructed index-coding instance
Compositionality
biblio
Secure Determinant Codes: Type-II Security
Submitted by grigby1 on Tue, 12/15/2020 - 1:28pm
resilience
type-II security
type II secrecy
storage management
security of data
security
secure exact-repair regenerating codes
secure determinant codes
secrecy constraint guarantees
Resiliency
coding theory
repair bandwidth
pubcrawl
per-node storage capacity
Metrics
ℓ compromised nodes
distributed storage systems
distributed processing
Cryptography
Compositionality
biblio
GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
Metrics
telecommunication network topology
synchronisation
SMBMM
security
secure multiparty batch matrix multiplication problem
secure interserver communication
Resiliency
resilience
pubcrawl
polynomials
polynomial sharing
pairwise products
noise alignment
network servers
batch processing
matrix multiplication
master gains no additional information
GCSA-NA
GCSA codes
flexible interserver network topology
Cryptography
Cross Subspace Alignment codes
computer network security
computational complexity
Compositionality
colluding servers
coding theory
codes
biblio
Singular Value Decomposition (SVD) based Image Tamper Detection Scheme
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
SVD
singular values
S-matrix theory
S matrix
quick response code feature extraction
quick response code
QR codes
QR code
image tamper detection scheme
image authentication techniques
image authentication
digital imaging
Cryptography
coding theory
singular value decomposition
Image coding
source coding
feature extraction
Compositionality
security
Resiliency
resilience
Metrics
pubcrawl
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
On Some Universally Good Fractional Repetition Codes
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
data storage
universally good Fractional Repetition codes
partial regular graph
multidimensional optimization problem
minimum distance bound
heterogeneous DSS
encoded packet replication
distributed storage systems
Data storage systems
storage overhead
coding theory
network coding
network theory (graphs)
pubcrawl
Compositionality
optimisation
computer network reliability
network security
storage management
Cryptography
security
optimization
computer network security
Resiliency
resilience
Metrics
biblio
Semantic Security for Quantum Wiretap Channels
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
Cryptography
telecommunication security
strongly secure code
semantically secure code
semantic security capacity
semantic security
security
secrecy
resilience
quantum wiretap channels
quantum communication
pubcrawl
nonsecure code
Indistinguishability
channel coding
Compositionality
coding theory
classical-quantum channels
classical-quantum
classical channels
capacity
BRI functions
BRI
biregular irreducible functions
biregular irreducible
composability
Resiliency
Metrics
biblio
Orthogonal STBC Set Building and Physical Layer Security Application
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
orthogonal codes
coding theory
Transforms
communication complexity
BER
brute force decoding complexity
communications link
complex orthogonal space-time block code
encodes data symbols
Monte Carlo simulations
transmitting antennas
orthogonal STBC matrix
orthogonal STBC set building
physical layer security application
physical layer security.
PLS
space-time block code
space-time block codes
transformation algorithms
Buildings
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Wireless communication
network security
pubcrawl
Compositionality
Signal processing algorithms
Monte Carlo methods
Decoding
error statistics
information theory
Physical layer
Bit error rate
biblio
Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
delay-optimal M-link codes
telecommunication security
synchronisation
streaming code
streaming applications
source symbol
security
secure transmission
resilience
pubcrawl
parallel burst erasure channels
low delay
eavesdropper
channel coding
delay-optimal coding
decoding delay constraint
Decoding
Cryptography
Compositionality
coding theory
code parameters
channel model
burst erasure multiple-link code
composability
Resiliency
Metrics
biblio
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Submitted by grigby1 on Tue, 12/15/2020 - 1:25pm
blockchain designs
trust-corrupting
truly scalable system
system throughput
sharding proposals
security scalability
PolyShard
polynomially coded sharding
performance scalability
node subsets
linearly scaling efficiency
information-theoretic upper bounds
decentralization scalability
coded storage protocol
coded sharding
Cryptography
coding theory
blockchain system
storage efficiency
information theory
linear codes
Compositionality
polynomials
Protocols
security
Resiliency
resilience
Metrics
pubcrawl
security of data
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »