Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information theory
biblio
Optimally-secure Coin-tossing against a Byzantine Adversary
Submitted by aekwall on Mon, 12/20/2021 - 12:30pm
Computational modeling
Protocols
probability
pubcrawl
Scalability
Metrics
Resiliency
Human behavior
Program processors
Object recognition
information theory
Adversary Models
biblio
Universal Hashing for Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:43pm
Physical layer
wiretap coding
wiretap codes
modular coding schemes
information coding
2-universal hash family
telecommunication services
Random variables
secret key agreement
information theoretic security
Communication channels
encoding
Noise measurement
Scalability
information-theoretic security
information theory
Metrics
Cryptography
Communication system security
policy-based governance
pubcrawl
Human behavior
Resiliency
security
Receivers
private key cryptography
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
instruction sequence
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
Informatics
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
Social network services
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Scalability
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
biblio
Information-spectrum methods for information-theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
information-theoretic security
wiretap channels
telecommunication security
secure rates
secrecy capacity
Scalability
Resiliency
Random variables
pubcrawl
policy-based governance
Mutual information
Metrics
Jamming
Interference
channel state information
information-spectrum methods
information theory
information theoretic security
information security
Information analysis
Human behavior
feedback
fading channels
Fading
ergodic fading channels
Cryptography
complex communication scenarios
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
error correction codes
pollution attack
Pollution
network error correction
network coding security
information-theoretic approach
Information rates
cryptographic signature
cryptographic approach
information theoretic security
multicast communication
Upper bound
error correction
network coding
Scalability
computer networks
information security
information theory
Metrics
Cryptography
wireless sensor networks
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
biblio
On measures of information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
information theory
Shannon perfect secrecy
information theoretic cryptosystem
ideal secrecy
information theoretic security
Vectors
Australia
probability
computational security
Scalability
Entropy
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptography
biblio
Cryptography with information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
quantum computing
unconditionally secure schemes
trusted initializer model
power system security
long-term security
information theoretic security
Computer graphics
cryptosystems
digital signatures
information security
Scalability
information theory
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Protocols
Cryptography
biblio
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:38pm
Performance Metrics
information theoretic security
standard authentication tags generation
Rijndael cipher
quantization
packet-based transmission
message authentication codes
Information-theoretic authentication codes
false acceptance probability
conditional equivocation
complexity-theoretic MAC
completeness error
channel coding and decoding
artificial-noise-aided message authentication codes
ANA-MAC
cryptographic primitive
Scalability
key recovery attack
Transmitters
Physical layer
information-theoretic security
channel coding
message authentication
information theory
authentication
Metrics
policy-based governance
pubcrawl
Human behavior
Resiliency
Receivers
Cryptography
biblio
Orthogonal STBC Set Building and Physical Layer Security Application
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
orthogonal codes
coding theory
Transforms
communication complexity
BER
brute force decoding complexity
communications link
complex orthogonal space-time block code
encodes data symbols
Monte Carlo simulations
transmitting antennas
orthogonal STBC matrix
orthogonal STBC set building
physical layer security application
physical layer security.
PLS
space-time block code
space-time block codes
transformation algorithms
Buildings
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Wireless communication
network security
pubcrawl
Compositionality
Signal processing algorithms
Monte Carlo methods
Decoding
error statistics
information theory
Physical layer
Bit error rate
biblio
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Submitted by grigby1 on Tue, 12/15/2020 - 1:25pm
blockchain designs
trust-corrupting
truly scalable system
system throughput
sharding proposals
security scalability
PolyShard
polynomially coded sharding
performance scalability
node subsets
linearly scaling efficiency
information-theoretic upper bounds
decentralization scalability
coded storage protocol
coded sharding
Cryptography
coding theory
blockchain system
storage efficiency
information theory
linear codes
Compositionality
polynomials
Protocols
security
Resiliency
resilience
Metrics
pubcrawl
security of data
« first
‹ previous
1
2
3
4
5
next ›
last »