Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
key size
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
A Practical, Provably Unbreakable Approach to Physical Layer Security
Submitted by grigby1 on Fri, 06/19/2020 - 10:33am
reciprocal channel state
Phase measurement
Phase shift keying
phase shift keying constellation
physical layer security
provably unbreakable approach
PSK constellation points
pubcrawl
Radio frequency
radio frequency propagation path
radiowave propagation
raw key bits
multipath fading
resilience
Resiliency
secure key exchange
SNR
static fading channel
telecommunication security
Time measurement
under-determined system
wireless transmission
zero information leakage
independent channel realization
channel coding
channel perturbation
composability
Cryptography
error statistics
Eves antennas
Eves signal-to-noise ratio
fading channel
fading channels
FEC
forward error correction
antennas
independent realizations
key consolidation
key size
linear equations
masking property
measured reciprocal channel phase
Metrics
mirrors
modulo 2π
multipath channel
biblio
Integrate Dragonfly Key Exchange (IETF - RFC 7664) into Arithmetic Circuit Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 10:35am
public keys
RFC7664
integrate dragonfly key exchange
implementation method
Fast Fully Homomorphic Encryption
Dragonfly Key Exchange
arithmetic circuit homomorphic encryption
arithmetic circuit
ACHE
Private keys
advanced encryption standard
Scalability
Homomorphic encryption
Human Factors
authentication
public key cryptography
Metrics
pubcrawl
Resiliency
private key cryptography
key size
biblio
Puncturable Attribute-Based Encryption for Secure Data Delivery in Internet of Things
Submitted by aekwall on Wed, 02/13/2019 - 10:58am
Receivers
key size
Lagrange Polynomial
Linear Secret Sharing
private key cryptography
Productivity
Puncturable Attribute Based Encryption schemes
Puncturable Attribute-Based Encryption
punctured keys
key distributor
secret keys
secure data delivery
telecommunication security
Human behavior
pubcrawl
collaboration
policy-based governance
Scalability
key distribution center
IoT devices
Internet-of-Things
Internet of Things
forward encryption
fine grained access control
decryption
cybercriminals
Conferences
attribute-based key
attribute based encryption
attribute-based encryption
Access Control
encryption
authorisation
biblio
Performance analysis of symmetric block cryptosystems on Android platform
Submitted by grigby1 on Wed, 02/21/2018 - 12:46pm
resilience
microprocessor chips
mobile communications
multicore CPUs
parallel processing
parallelization
parameter selection
Performance analysis
plaintext size
Protocols
pubcrawl
Metrics
Resiliency
Scalability
software resources
standards
symmetric block ciphers
symmetric block cryptosystems
symmetric ciphers
terminal devices
Three-dimensional displays
variable parameters
cryptosystem performance
AES
android encryption
Android platform
Androids
appropriate cryptosystem
authentication
Ciphers
core element
cryptographic communications systems
Cryptography
3DES
different operating modes
encryption
hardware resources
Human behavior
Human Factors
Humanoid robots
integrity
key size
message confidentiality
biblio
An architectural framework for encryption amp; generation of digital signature using DNA cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:05am
DNA computing DNA cryptography
Steganography
plaintext size
key size
information security
encryption time
encryption algorithms
encryption
encoding
DNA digital coding
DNA cryptography
architectural framework
DNA computing
DNA
digital signatures
digital signature generation
digital signature encryption
decryption time
cryptanalysis
Ciphers
biocomputing