Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
error statistics
biblio
High-Throughput Covert Channels in Adaptive Rate Wireless Communication Systems
Submitted by grigby1 on Thu, 07/16/2020 - 12:18pm
radio networks
link adaptation
low-density parity-check codes
modulation
modulation and coding schemes
modulation coding
multiple MCS rates
parity check codes
pubcrawl
Information hiding
resilience
Resiliency
Scalability
Throughput
underlying communication system
Wireless communication
wireless LAN
wireless local area network modulation
directional multi-Gigabit (DMG)
adaptive rate wireless communication systems
channel capacity
coding schemes
composability
Compositionality
covert channel performance
covert channel throughput
covert channels
adaptation mechanisms
embedding techniques
error statistics
forward error correction
forward error correction-based information hiding technique
generalized information hiding model
high-throughput covert channels
IEEE 802.11ad WLAN
biblio
Proposal of Equal-Weight (2, 2) Visual Secret Sharing Scheme on VN-CSK Illumination Light Communication
Submitted by aekwall on Mon, 07/13/2020 - 11:17am
Scalability
Modified Pseudo-Orthogonal M-sequence
occurence probability
optical transmitters
orthogonal codes
probability
pubcrawl
Receivers
Resiliency
Metrics
secret data
telecommunication security
variable N-parallel code-shift-keying system
Visual Light Communications Security
visual secret sharing scheme
VN-CSK illumination light communication
VN-CSK system
adjacent illumination light interference
m-sequences
lighting function
lighting
light signal
light emitting diodes
indoor visible light communication channel
illumination light overlapping area
free-space optical communication
error statistics
Distributed databases
dimming control problem
data communication
Cryptography
constant illuminance
bit error rate performance
biblio
Digital Coherent 20-Gbit/s DP-PSK Y-00 Quantum Stream Cipher Transmission over 800-km SSMF
Submitted by grigby1 on Fri, 06/19/2020 - 11:34am
light transmission
SSMF
Signal to noise ratio
signal phase level masking
Resiliency
resilience
quantum-noise signal masking
pubcrawl
Phase shift keying
Phase modulation
Optical noise
optical modulation
optical fibre communication
Metrics
217-level random phase modulation
light polarisation
level random phase modulation
HD-FEC threshold
forward error correction
fiber-optic transmission security
error statistics
encryption
dual polarization
digital coherent DP-PSK Y-00 quantum stream cipher transmission
Cryptography
composability
Ciphers
BER
biblio
Digital-Domain Dual Encryption Key-Based Phase Shift Symbol Masking with Cascaded Encoder/Decoder for Secure Coherent Optical Systems
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
forward error correction
telecommunication security
SSMF transmission
secure coherent optical systems
Resiliency
resilience
quadrature phase shift keying
pubcrawl
optical modulation
optical fibre communication
Metrics
cascaded decoder
FEC limit
error statistics
encoding
dual encryption-key-based digital-domain symbol masking
digital-domain dual encryption key-based phase shift symbol masking
Decoding
Cryptography
composability
coherent QPSK system
cascaded encoder
biblio
Using Perfect Codes in Relay Aided Networks: A Security Analysis
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
Reliability
passive eavesdropping attacks
perfect codes
PHY-layer security approaches
physical layer operations
proper security mechanism
pubcrawl
radio networks
Receivers
relay aided networks
Relays
nonnegotiable concept
reliable intermediate relays
resilience
Resiliency
security
Security analysis
selected FEC scheme
simulations
system operations
wireless channels
distinct requirements
composability
cooperative communication
CPS
CPS modeling
CPS Security
Cryptography
cyber-physical systems
Decoding
decoding frame error rate
communication environments
error injection
error probability
error statistics
FEC codes.
forward error correction
forward error correction schemes
Hamming codes
human lives
Metrics
biblio
A Practical, Provably Unbreakable Approach to Physical Layer Security
Submitted by grigby1 on Fri, 06/19/2020 - 11:33am
reciprocal channel state
Phase measurement
Phase shift keying
phase shift keying constellation
physical layer security
provably unbreakable approach
PSK constellation points
pubcrawl
Radio frequency
radio frequency propagation path
radiowave propagation
raw key bits
multipath fading
resilience
Resiliency
secure key exchange
SNR
static fading channel
telecommunication security
Time measurement
under-determined system
wireless transmission
zero information leakage
independent channel realization
channel coding
channel perturbation
composability
Cryptography
error statistics
Eves antennas
Eves signal-to-noise ratio
fading channel
fading channels
FEC
forward error correction
antennas
independent realizations
key consolidation
key size
linear equations
masking property
measured reciprocal channel phase
Metrics
mirrors
modulo 2π
multipath channel
biblio
Security Aware Spatial Modulation (SA-SM)
Submitted by aekwall on Mon, 06/15/2020 - 11:01am
peak-to-average-power-ratio
forward-error-correction threshold
HN
interchannel interference
Internet-of-Things deployments
MIMO
MIMO communication
MIMO techniques
multiple-input multiple-output techniques
optical transmitters
Peak to average power ratio
degree of technology independent physical layer security
radio range
SA-SM
secure technique
security aware spatial modulation
SM
space division multiplexing
spatial multiplexing
system complexity
visible light range
VLC
error statistics
computer network security
Internet of Things
Receivers
security
Radio frequency
Resiliency
pubcrawl
composability
Metrics
Decoding
IoT
computer network reliability
spectral efficiency
radio receivers
OFDM
forward error correction
adjacent channel interference
arising security concerns
bit-error-rate
communication system capacity
communication system reliability
biblio
Embedding Covert Information on a Given Broadcast Code
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
random codes
information theoretic security
information-theoretic security
Low Probability of Detection
Metrics
necessary conditions
original broadcast communication
policy-based governance
Probability distribution
pubcrawl
Indexes
random coding argument
Random variables
Receivers
resilience
Resiliency
Scalability
stronger receiver
Transmitters
weaker receiver
decoding error probability
Broadcast Channel
broadcast channels
broadcast code
channel capacity
channel coding
covert communication
covert communications
covert message
Decoding
asymptotic fundamental limits
degraded discrete memoryless broadcast channel
DM-BC
embedding covert information
error probability
error statistics
general DM-BCs
Human behavior
Human Factors
biblio
A Secure and Power-Efficient Constellations for Physical Layer Security
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
communication security
wireless networks
wireless channels
symmetrical constellations
symbol error rate performance
SER performance
power-efficient constellations
power-efficiency
polarization modulation
Monte Carlo simulation
Monte Carlo methods
double-layer constellations
double layers constellations
telecommunication security
8
4
16-order double-layer constellations
physical layer security
error statistics
resilience
Resiliency
Metrics
composability
pubcrawl
optimisation
biblio
A Novel Physical Layer Security Technique Using Master-Slave Full Duplex Communication
Submitted by grigby1 on Fri, 04/10/2020 - 12:19pm
omnidirectional antenna
high power signal
Interference
interference masks
Internet-of-Things networks
IoT networks
IoT node
legitimate intended nodes
Master-slave communication
master-slave full duplex communication node
full-duplex manner
omnidirectional antennas
Phase modulation
phase-modulated random key-data generation
physical layer security
physical layer security technique
received signal
receiving antennas
self-interference cancellation
signal transmission
resilience
security
computer network security
computer network reliability
Reliability
Receivers
pubcrawl
composability
Metrics
Resiliency
Internet of Things
BER
Bit error rate
bit-error rate
communication reliability
directional antennas
directive antennas
error statistics
Eve location
full-duplex
« first
‹ previous
1
2
3
4
5
6
next ›
last »