Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
communication overhead
biblio
Controlling the Communication Overhead of Source Location Privacy Protocols in Multi-hop Communication Wireless Networks
Submitted by grigby1 on Tue, 08/17/2021 - 4:31pm
privacy
wireless sensor networks
Wireless Sensor Network
wireless networks
source location privacy
Routing protocols
Routing
Resiliency
resilience
pubcrawl
communication overhead
Phantoms
phantom routing
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
fake packet routing
energy consumption
Compositionality
biblio
Multi-branch Source Location Privacy Protection Scheme Based on Random Walk in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 12:04pm
multibranch source location privacy protection method
radiofrequency interference
WSN
source node
location privacy preservation
communication overhead
Position measurement
location security
branch interference area
location-related data
Base stations
multibranch source location privacy protection scheme
multiple branch
multiple proxy sources
proxy source
random walk
sensing information
sink location privacy
Location Privacy in Wireless Networks
privacy
data privacy
telecommunication security
security
Resiliency
Human behavior
pubcrawl
wireless sensor networks
location privacy
Monitoring
Routing
sensor nodes
Metrics
random processes
network lifetime
base station
Compositionality
privacy protection
biblio
fABElous: An Attribute-Based Scheme for Industrial Internet of Things
Submitted by aekwall on Mon, 08/17/2020 - 11:41am
wireless sensor networks
technological vision
industrial IoT applications
fABElous
ciphertext-policy attribute-based encryption
broadcast
attribute-based scheme
ABE techniques
ABE scheme
CP-ABE
communication overhead
actuators
Constrained Devices
Intelligent sensors
Scalability
policy-based governance
pubcrawl
Human behavior
embedded devices
data integrity
Internet of Things
attribute-based encryption
abe
encryption
data confidentiality
Cryptography
authorisation
Access Control
biblio
An Anonymous Conditional Privacy-Preserving Authentication Scheme for VANETs
Submitted by grigby1 on Thu, 08/13/2020 - 5:21pm
Protocols
wireless environment
verifiable secret sharing(VSS)
verifiable secret sharing
vehicular ad hoc networks
Vehicular ad hoc network(VANET)
VANET
Traffic Safety
telecommunication traffic
telecommunication security
Security analysis
Scalability
Resiliency
resilience
pubcrawl
anonymous conditional authentication scheme
privacy-preserving requirements
privacy-preserving authentication scheme
Privacy-preserving
privacy
mutual authentication phase
message generation
message authentication code(MAC)
message authentication code
message authentication
data privacy
Cryptography
communication overhead
authentication
anonymous messaging
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Asymmetric Encryption
securing multiparty communication
MultiRSA
multiple recipients
Multi-recipient Encryption
lightweight scalable multirecipient asymmetric cryptographic scheme
lightweight AMOUN
high computational cost
group membership changes
dynamic networks
chosen plaintext attack
Chinese remainder theorem
Cathode ray tubes
asymmetric cryptography
communication overhead
encryption
network resources
symmetric cryptography
Compositionality
Security analysis
public key cryptography
Public key
Metrics
privacy
pubcrawl
Human behavior
Resiliency
decryption
Computational efficiency
biblio
Automatic Generation of Hierarchical Contracts for Resilience in Cyber-Physical Systems
Submitted by aekwall on Mon, 07/06/2020 - 10:14am
resilience
Monitoring
multiobjective optimization problem
nonfunctional properties
numerous contracts
object-oriented programming
operating conditions
optimisation
power system stability
pubcrawl
rapid fault detection
Metrics
Resilience Decentralized Algorithms
Resiliency
root contract
Scalability
Silicon
system design
System Level
System performance
web services
Cyber Dependencies
cyber physical systems
Automatic Contract Generation
automatic contract refinement
automatic generation
communication overhead
Compositionality
Contract Synthesis
contracts
core issue
CPS resilience
cyber-physical systems
fault diagnosis
growing scale
hierarchical contract-based resilience framework
hierarchical contracts generation
Human Factors
large-scale CPS
lower-level contract
manufacturing domain
biblio
An Efficient Secure Coded Edge Computing Scheme Using Orthogonal Vector
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
resilience
irrelevant random blocks
last mile problem
linear codes
linear coding
Metrics
original data blocks
orthogonal vector
policy-based governance
pubcrawl
information theoretical security
Resiliency
Scalability
secure edge
security of data
unreliable edge nodes
user device
Vectors
widespread solution
Decoding
security
actual EC deployments
Cloud Computing
communication overhead
computational complexity
compute-intensive applications
data confidentiality
data matrix
Data Security
coding theory
edge computing
edge devices
efficient edge
efficient secure coded edge computing scheme
high decoding complexities
Human behavior
Human Factors
information theoretic security
biblio
An Improved Key Graph Based Key Management Scheme for Smart Grid AMI Systems
Submitted by grigby1 on Mon, 01/27/2020 - 12:25pm
security
Metrics
power engineering computing
Pricing
Protocols
pubcrawl
resilience
Resiliency
Scalability
scalable key management
key management scheme
Smart Grid
smart grid AMI systems
Smart Grids
smart meters
smart power grids
storage management
storage overhead
Unicast
VerSAMI key graph structure
computer network security
automatic meter reading
broadcast communication
broadcast key management performance
broadcast key management protocol
broadcast key management security
broadcast key update process
communication overhead
computer network management
computer network performance evaluation
advanced metering infrastructure
Conferences
Cryptography
graph theory
Human behavior
Human Factors
improved key graph
iVerSAMI
key graph based scheme
key management
biblio
Performance evaluation of an authentication mechanism in time-triggered networked control systems
Submitted by willirn1 on Fri, 05/31/2019 - 11:18am
networked control systems
Vanderbilt
TTEthernet network
TTEthernet
timing behavior
time-triggered networked control systems
Time-Trigger Architectures
time triggered architectures
Synchronization
Switches
security mechanisms
Secure Messages
safety property
reliability property
Receivers
performance evaluation
System-security co-design
network data communication
message integrity
message confidentiality
message authentication
Local area networks
HMAC
hash based message authentication
fault tolerance property
Cryptography
computer network security
computation overhead
communication overhead
authorisation
authentication mechanism
biblio
EliMO: Eliminating Channel Feedback from MIMO
Submitted by el_wehby on Fri, 05/25/2018 - 3:47pm
FTF
wireless LAN
WiFi station
WiFi networks
two-way channel estimation
Throughput
STA
Signal to noise ratio
Receivers
multiple-input multiple-output networks
MIMO communication
MIMO beamforming
MIMO
implicit feedback
access points
feedback training field
explicit feedback
EliMO
downlink training symbols
downlink CSI
Downlink
communication overhead
channel state information feedback
channel feedback elimination
Channel estimation
array signal processing
AP
1536086
1
2
next ›
last »