Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic primitive
biblio
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 3:38pm
Performance Metrics
information theoretic security
standard authentication tags generation
Rijndael cipher
quantization
packet-based transmission
message authentication codes
Information-theoretic authentication codes
false acceptance probability
conditional equivocation
complexity-theoretic MAC
completeness error
channel coding and decoding
artificial-noise-aided message authentication codes
ANA-MAC
cryptographic primitive
Scalability
key recovery attack
Transmitters
Physical layer
information-theoretic security
channel coding
message authentication
information theory
authentication
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Receivers
Cryptography
biblio
Asymmetric Physical Layer Encryption for Wireless Communications
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
quantisation (signal)
Wireless communications
quantized information entropy
private channel
possible eavesdroppers
orthogonal frequency-division multiplexing (OFDM)
cryptographic primitive
constellation confusion degree
complex-domain signals
asymmetric PLE
asymmetric physical layer encryption scheme
Asymmetric Encryption
radio receivers
Wireless communication
wireless channels
encryption
Compositionality
Elliptic curve cryptography
physical layer security
Physical layer
public key cryptography
error statistics
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
telecommunication security
Receivers
biblio
Secure object tracking protocol for Networked RFID Systems
Submitted by grigby1 on Wed, 03/08/2017 - 1:30pm
security
protocol
Protocols
pubcrawl170112
PUF
radiofrequency identification
radiofrequency identification technology
RFID
secure object tracking protocol
privacy
security protocol description language
SPDL model
supply chains
telecommunication security
tracker
unclonable
visibility
networked RFID system
cryptographic primitive
Cryptographic Protocols
Diffie-Hellman algorithm
distributed system
injection of fake objects
IoT
lawful business operation
Mathematical model
automated claim verification tool Scyther
non-repudiation
NRS
NRS system security
object traceability
object tracking
object visibility
physically unclonable function
biblio
On the security of a certificateless signcryption scheme
Submitted by BrandonB on Wed, 05/06/2015 - 10:02am
encryption
Security analysis
Receivers
public key encryption
public key cryptography
Public key
key replacement attack
IND-CCA2 security
group theory
Games
certificateless signcryption scheme
discrete logarithm problem
Digital Signcryption
digital signatures
digital signature
Diffie-Hellman problem
Cryptography
cryptographic primitive
concrete attack approach
Computers