Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
nuisance parameters and committal to writing theory
biblio
Robust encryption algorithm based SHT in wireless sensor networks
Submitted by BrandonB on Mon, 05/04/2015 - 1:12pm
network traffic
wireless sensor networks
wireless device network
testing
telecommunication traffic
supply location
sturdy cryptography algorithmic rule
SHT
robust encryption algorithm
privacy
nuisance parameters and committal to writing theory
nuisance data victimization sturdy cryptography algorithmic rule
anonymity
machine load problem
location privacy
interval indistinguishability
Hypothesis testing
encryption
device network obscurity
Cryptography
Correlation
consecutive hypothesis testing
Computer hacking
communication overhead