Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
eavesdropping attack
biblio
The spatial cross-correlation of received voltage envelopes under non-line-of-sight
Submitted by grigby1 on Tue, 05/30/2023 - 3:18pm
component
spatial cross-correlation
Physical-layer key
nLoS
eavesdropping attack
decorrelation
Voltage
Physical layer
Compositionality
security
composability
Wireless communication
Cross Layer Security
Safety
Correlation
Resiliency
resilience
pubcrawl
biblio
Impact of Minimizing the Eavesdropping Risks on Lifetime of Underwater Acoustic Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 2:59pm
pubcrawl
Underwater Networks
Underwater acoustics
underwater acoustic sensor networks
underwater
security
Scalability
Resiliency
resilience
Receivers
batteries
optimization
Numerical models
network lifetime
Metrics
Linear programming
Energy Efficiency
eavesdropping attack
eavesdropping
Cyber Physical System
biblio
New Quantum Secret Sharing Protocol Using Entangled Qutrits
Submitted by aekwall on Mon, 03/30/2020 - 11:41am
Communication channels
quantum computing security
security amplification
quantum secure direct communication
quantum secret sharing protocol
Quantum secret sharing
quantum memory
ping-pong protocol
Optimized production technology
entangled qutrits
entangled qubits
eavesdropping attack
detection of eavesdropping
Scalability
Quantum entanglement
Predictive Metrics
quantum cryptography
quantum computing
Cryptography
composability
pubcrawl
Resiliency
eavesdropping
Protocols
telecommunication security
biblio
A Simulation and Experimental Study of Channel Reciprocity in TDD and FDD Wiretap Channels
Submitted by grigby1 on Wed, 03/04/2020 - 4:15pm
telecommunication security
physical layer security
private key cryptography
pubcrawl
secret key generation studies
security
software radio
TDD
TDD mode
Pearson correlation coefficient
theoretical analysis
theoretical cryptography
time division duplexing
time division multiplexing
USRP
wireless channel reciprocity
wireless channels
X310 universal software radio peripheral
FDD
channel state information
composability
Compositionality
correlation methods
CSI correlation coefficient
eavesdropping attack
eavesdropping distance
eavesdropping wiretap channel model
channel reciprocity
FDD channel reciprocity
FDD wiretap channels
frequency division duplexing
frequency division multiplexing
indoor radio
indoor wireless CSI measurement system
legitimate channel
N210
biblio
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Submitted by grigby1 on Tue, 01/23/2018 - 2:54pm
Human behavior
triangular scrambling method
triangular scrambling
transmitted image
transmission channel
subkeys
Resiliency
pubcrawl
privacy
Metrics
man in the middle attack
image encryption
Image coding
hybrid encryption image mechanism
chaos
encryption
eavesdropping attack
DNA sequences
DNA encoding
DNA cryptography
DNA
Cryptography
Correlation
computer science
color image encryption
Ciphers
Chaotic maps
biblio
A Group File Encryption Method using Dynamic System Environment Key
Submitted by BrandonB on Tue, 05/05/2015 - 8:38am
dynamic system environment key
system environment key
Servers
security level
security
message authentication
group file encryption
GEMS
file organisation
encryption
eavesdropping attack
auditing security scheme
DRM
decryption method
Cryptography
Computers
Cloud Computing
business data processing
autocrypt
authorization
authorisation
authentication