Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

wireless device network

biblio

Visible to the public Robust encryption algorithm based SHT in wireless sensor networks

Submitted by BrandonB on Mon, 05/04/2015 - 2:12pm
  • network traffic
  • wireless sensor networks
  • wireless device network
  • testing
  • telecommunication traffic
  • supply location
  • sturdy cryptography algorithmic rule
  • SHT
  • robust encryption algorithm
  • privacy
  • nuisance parameters and committal to writing theory
  • nuisance data victimization sturdy cryptography algorithmic rule
  • anonymity
  • machine load problem
  • location privacy
  • interval indistinguishability
  • Hypothesis testing
  • encryption
  • device network obscurity
  • Cryptography
  • Correlation
  • consecutive hypothesis testing
  • Computer hacking
  • communication overhead

Terms of Use  |  ©2023. CPS-VO