Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
computation complexity
biblio
An Approach for End-to-End (E2E) Security of 5G Applications
Submitted by aekwall on Mon, 11/23/2020 - 11:23am
heterogeneous networked society
5G Applications
5G protocols
attack resistance rate
dependable security mechanism
differentiated security
diffie hellman key exchange
E2E
End to End Security analysis
End-to-End data protection
end-to-end security
flexible security mechanism
3D PAKE protocol
industrial vision
Internet Security Protocols
key business driver
manifold applications
networking paradigms
next-generation mobile technology
security defensive rate
Tetrahedron property analysis
Intelligent Data Security
Intelligent Data and Security
security threats
Scalability
Servers
attack surface
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
internet
authentication
message authentication
5G mobile communication
computer network security
Elliptic curve cryptography
security operations
heterogeneous environment
Compositionality
Three-dimensional displays
confidentiality
communication complexity
computation complexity
Resistance
key management
biblio
Xyreum: A High-Performance and Scalable Blockchain for IIoT Security and Privacy
Submitted by aekwall on Mon, 02/10/2020 - 12:04pm
Human Factors
Xyreum
time-based zero-knowledge proof of knowledge
time-based zero knowledge proof of knowledge
mutual multifactor authentication
Industrial Internet of Things
enhanced IIoT security
computational complexity
computation complexity
blockchain-based security protocol
blockchain solutions
blockchain group decision-making process
blockchain designs
multifactor authentication
authenticated encryption
Privacy-preserving
security
Scalability
Distributed databases
Cyber Attacks
Decision Making
blockchain
Metrics
Cryptography
privacy
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
Internet of Things
data privacy
biblio
Detection of LSSUAV using hash fingerprint based SVDD
Submitted by K_Hooper on Wed, 01/10/2018 - 11:09am
IEEE 802.11n Standard
Unmanned Aerial Vehicles
UAV detection
SVDD recognition
Signal to noise ratio
Resiliency
radar detection
pubcrawl
Protocols
novel distance-based support vector data description algorithm
LSSUAV
Acoustic Fingerprints
Human behavior
hash fingerprint based SVDD
hash fingerprint
fingerprint identification
feature extraction
computation complexity
composability
autonomous aerial vehicles
Ad hoc networks
biblio
A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution
Submitted by grigby1 on Mon, 02/27/2017 - 12:56pm
mobile devices
Steganography
steganalysis
sensors
security
Resistance
Resiliency
pubcrawl170107
PSNR-controllable data hiding algorithm
PSNR
personal privacy
PCDH
Algorithm design and analysis
LSB substitution
information security
Image coding
encoding
decoding algorithms
Decoding
Control Theory
computational complexity
computation complexity
Complexity theory
biblio
Chinese remainder theorem based centralised group key management for secure multicast communication
Submitted by BrandonB on Wed, 05/06/2015 - 1:40pm
centralised group key management
Chinese remainder theorem
communication complexity
computation complexity
multicast communication
Multimedia communication
secure multimedia multicast communication
telecommunication security