Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic technique
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
Cross-Layered Security Approach with Compromised Nodes Detection in Cooperative Sensor Networks
Submitted by grigby1 on Wed, 01/10/2018 - 11:21am
Cryptography
wireless sensor networks
wireless networks
telecommunication security
security of wireless communication
Resiliency
Relays
pubcrawl
Physical layer
MIMO communication
MIMO
information theory based compromised nodes detection algorithm
information theory
array signal processing
cryptographic technique
cross-layered security approach
Cross Layer Security
cooperative sensor networks
cooperative MIMO radios
cooperative MIMO communication
cooperative communication
composability
cognitive radio networks
cognitive radio
beamforming
biblio
Enhancing security in cyber-physical systems through cryptographic and steganographic techniques
Submitted by BrandonB on Wed, 05/06/2015 - 1:08pm
information technology
Steganography
steganographic technique
security enhancement
Receivers
Public key
Pragmatics
physical elements
multi-agent systems
authorisation
hierarchical access
encryption
Data Security
data confidentiality
cyber-physical systems
Cryptography
cryptographic technique
computational elements