Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Telecommunications
biblio
Classification of Optimal Ternary (r, δ)-Locally Repairable Codes Attaining the Singleton-like Bound
Submitted by grigby1 on Fri, 09/18/2020 - 12:46pm
Telecommunications
δ)-LRC classification
δ)-locally repairable codes
ternary codes
Singleton-like bound
r
q-ary LRC
optimal ternary LRC
optimal ternary (r
optimal ternary (n
linear code
k
code symbol
coding theory
information security
linear codes
human computer interaction
Upper bound
error correction codes
Compositionality
Metrics
Cryptography
Indexes
Generators
Resiliency
resilience
pubcrawl
security
biblio
Secrecy Rate Analysis for Visible Light Communications Using Spatial Modulation
Submitted by aekwall on Mon, 07/13/2020 - 10:18am
System performance
receiver
Resiliency
Scalability
secrecy performance
secrecy rate
secrecy rate analysis
SM based VLC
spatial modulation
spatial modulation scheme
pubcrawl
telecommunication security
Telecommunications
uniform selection
upper bounds
US scheme
visible light communication
visible light communications
Visual Light Communications Security
light emitting diodes
CAS scheme
channel adaptive selection scheme
derived secrecy rate bounds
dimmable average optical intensity constraints
eavesdropper
free-space optical communication
indoor communication
indoor VLC system
information theory
active transmitter
lower bounds
Metrics
modulation
multiple transmitters
optical modulation
optical receivers
optical transmitters
physical layer security
biblio
Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Submitted by grigby1 on Tue, 06/02/2020 - 10:54am
source coding
pubcrawl
public channel
public key cryptography
Relays
resilience
Resiliency
Scalability
secret keys
security
policy-based governance
source coding scheme
source sequences
source-type model
telecommunication security
Telecommunications
trusted helper
untrusted helper
Upper bound
Indexes
cooperative communication
cooperative key generation
cooperative two-key generation
Decoding
discrete memoryless sources
five-terminal system
generated keys
Human behavior
Human Factors
channel capacity
information theoretic security
information-theoretic security
key capacity region
key leakage rate
Metrics
partial-trusted helpers
passive eavesdropper
physical layer security
biblio
Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices
Submitted by aekwall on Wed, 05/01/2019 - 11:38am
identity-based encryption schemes
Telecommunications
standards
smart meters
smart cards
Scalability
Resiliency
public key cryptography
pubcrawl
performance evaluation
pairing-based elliptic curve cryptography
Metrics
Bilinear Pairing
group signatures
embedded devices
Elliptic curves
Elliptic curve cryptography
digital signatures
Cryptography
Cryptographic Protocols
cryptographic libraries
Constrained Devices
bilinear pairing operation
biblio
Mathematical Models of Blocks for Compensation Multipath Distortion in Spatially Separated Passive Time-Frequency Synchronization Radio System
Submitted by grigby1 on Fri, 03/15/2019 - 10:56am
Scalability
pubcrawl
Radio navigation
radio navigation systems
radio receivers
radio waves multipath propagation
radiofrequency interference
radiowave propagation
resilience
Resiliency
passive time-frequency synchronization radio system
security
signal-to-noise ratio
synchronisation
Synchronization
synchronization distortion
Telecommunications
time and frequency synchronization
Time Frequency Analysis
Time-frequency Analysis
interference-free signal
distortion
error statistics
Fourier transform
Frequency synchronization
frequency synchronization system
frequency synchronization tasks
Interference
interference component
interference suppression
correlation function
Mathematical model
mathematical models
Metrics
multi-position passive synchronization system
multipath compensation
multipath distortion
multipath interference suppressors
multipath signal propagation
biblio
Post quantum hash based digital signatures comparative analysis. Features of their implementation and using in public key infrastructure
Submitted by grigby1 on Fri, 09/28/2018 - 2:12pm
Public key
XMSS algorithm implementation
XMSS algorithm
Ukrainian hash function national standard
Telecommunications
system analysis and design
SPHINCS algorithm
Scalability
resilience
Quantum-safe digital signatures
public key infrastructure
public key cryptography
computer science
pubcrawl
post quantum hash based digital signatures
post quantum cryptography
perspective digital signatures algorithms
Merkle algorithm
Leighton-Micali algorithm
hash functions analysis
Hash based digital signatures
digital signatures
cybernetics
biblio
Analysis of Cyber Physical Systems Security via Networked Attacks
Submitted by grigby1 on Mon, 03/19/2018 - 12:49pm
security
Metrics
MITM
networked attacks
Networked Control System
networked control systems
pubcrawl
resilience
Resiliency
Mathematical model
Security Control
security of data
security perspective
Stealth Attack
system security conditions
telecommunication security
Telecommunications
unified models
cyber-physical systems
actuators
Analytical models
closed-loop security control structure
composability
computer network security
Cyber Attacks
cyber physical systems
Cyber Physical Systems Security
actuator security
defense functions
Denial-of-Service
DoS
Human behavior
information disclosure
Iron
man-in-the-middle attack
biblio
Models of Information Security Risk Accounting in Metrics of Dynamic Routing Protocols
Submitted by grigby1 on Mon, 03/05/2018 - 12:12pm
pubcrawl
transmitted information
Telecommunications
security
Routing protocols
routing metrics
Routing
Resiliency
resilience
quality of service
QoS indicators
composability
Metrics
Measurement
information security risk indicator
information security risk accounting
information security risk
dynamic routing protocols
dynamic networks
computing metrics
computer science
computer network security
biblio
Models of Information Security Risk Accounting in Metrics of Dynamic Routing Protocols
Submitted by grigby1 on Mon, 03/05/2018 - 12:11pm
pubcrawl
transmitted information
Telecommunications
security
Routing protocols
routing metrics
Routing
Resiliency
resilience
quality of service
QoS indicators
composability
Metrics
Measurement
information security risk indicator
information security risk accounting
information security risk
dynamic routing protocols
dynamic networks
computing metrics
computer science
computer network security
biblio
Meeting the Challenges of Critical and Extreme Dependability and Security
Submitted by grigby1 on Thu, 12/28/2017 - 12:28pm
intrusion tolerance
ultra-resilient components
Telecommunications
sophisticated targeted attacks
Software
security of data
security
Resiliency
resilience
pubcrawl
Protocols
Advanced and persistent threats
Hardware
fault and intrusion tolerance
extreme security risks
extreme computing
dependability risks
composability
APT
Algorithm design and analysis
advanced persistent threats
« first
‹ previous
1
2
3
4
5
6
next ›
last »