Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure transmission
biblio
Simulation and Analysis of the Influence of Artificial Interference Signal Style on Wireless Security System Performance
Submitted by grigby1 on Tue, 04/19/2022 - 9:43am
resilience
Wireless communication
System performance
simulation
signal style
signal processing security
security
secure transmission
Resiliency
Analytical models
pubcrawl
privacy
Metrics
Interference
information processing
composability
artificial interference
biblio
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation
Submitted by grigby1 on Thu, 04/08/2021 - 4:13pm
phase encoding framework
decoder estimate
distributed source coding
distributed source coding perspective
Fourier-Mellin transform
hash security
image hashing
minimal hash size
minimal information exchange
central server
Phase spectrum
reference image
rigid image registration
rigid image registration technique
secure image hash-based geometric transformations estimation
signal processing applications
transformation parameters
computational complexity
information security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Bandwidth
Cryptography
Forensics
image registration
source coding
information forensics
Image coding
secure communication
secure transmission
biblio
Delay-Optimal Coding for Secure Transmission over Parallel Burst Erasure Channels with an Eavesdropper
Submitted by grigby1 on Tue, 12/15/2020 - 12:26pm
delay-optimal M-link codes
telecommunication security
synchronisation
streaming code
streaming applications
source symbol
security
secure transmission
resilience
pubcrawl
parallel burst erasure channels
low delay
eavesdropper
channel coding
delay-optimal coding
decoding delay constraint
Decoding
Cryptography
Compositionality
coding theory
code parameters
channel model
burst erasure multiple-link code
composability
Resiliency
Metrics
biblio
Performance Analysis of Cluster based Secured Key Management Schemes in WSN
Submitted by aekwall on Mon, 09/21/2020 - 2:46pm
large scale networks
wireless sensor networks
transmitted information
telecommunication network management
symmetric sets
security of data
security holes
secure transmission
secure information transmission
secure clusters
Routing
Resiliency
pubcrawl
privacy
mystery keys
asymmetric key sets
key management schemes
key management framework
Key Management and Secure Transmission
information security
information records
encoded data
cyber-physical systems
Cryptography
confinement
composability
clustering
cluster-based wireless sensor networks
CBWSN
biblio
A Stochastic based Physical Layer Security in Cognitive Radio Networks: Cognitive Relay to Fusion Center
Submitted by grigby1 on Fri, 09/18/2020 - 12:56pm
fusion center
AF-CSSCRN security
Amplify-and-Forward
amplify-and-forward cooperative spectrum sensing
antenna arrays
average secrecy rate
cognitive relay
CRN
external malicious threats
fifth-generation systems
AF-CSS
Geometry
multiple antennas
secondary users
secure communication
secure transmission
spectrum sensing data
stochastic geometry
Cognitive Radio Security
physical layer security
resilience
Resiliency
telecommunication security
5G mobile communication
sensor fusion
Communication system security
Stochastic processes
cooperative communication
pubcrawl
cognitive radio
radio spectrum management
signal detection
amplify and forward communication
Cognitive Radio Network
cognitive radio networks
5G systems
access points
biblio
A Stochastic Method to Physical Layer Security of an Amplify-and-Forward Spectrum Sensing in Cognitive Radio Networks: Secondary User to Relay
Submitted by grigby1 on Fri, 04/10/2020 - 11:20am
fading channels
amplify-and-forward cooperative spectrum sensing
average secrecy rate
Cognitive Radio Network
cognitive radio networks
Communication system security
compressed sensing
correlated AP
CRN network
Amplify-and-Forward
fusion center
malicious eavesdropping secondary users
Relays
secondary user
sensing data
sensor fusion
stochastic geometry
stochastic method
resilience
sensors
Wireless communication
telecommunication security
secure transmission
pubcrawl
composability
Metrics
Resiliency
security
Interference
physical layer security
cognitive radio
cooperative communication
radio spectrum management
active SUs
AF-CSS-CRN
amplify and forward communication
biblio
Delay Optimal Coding for Secure Transmission over a Burst Erasure Wiretap Channel
Submitted by grigby1 on Mon, 04/06/2020 - 1:23pm
Resiliency
Metrics
minimum possible delay
network coding
optimal secure burst erasure
perfect security
pubcrawl
Receivers
resilience
low-delay coding
Secure Messages
secure transmission
security
streaming code
Streaming communication
Systematics
telecommunication security
delay optimal burst erasure correcting
block codes
burst erasure correcting code
burst erasure wiretap channel
code parameters
composability
cyber physical systems
Decoding
delay constraint
channel coding
delay optimal coding
delay optimal streaming codes
delays
diagonal interleaving
DO-SBE block codes
error correction codes
information security
biblio
Statistical Analysis of Enhanced SDEx Encryption Method Based on SHA-256 Hash Function
Submitted by grigby1 on Wed, 03/18/2020 - 11:27am
data encryption
Data Security
end-to-end data security
NIST statistical test suite
SDEx method
secure communication
secure data exchange method
secure transmission
pubcrawl
Resiliency
resilience
Secure File Sharing
biblio
Physical layer security using BCH and LDPC codes with adaptive granular HARQ
Submitted by grigby1 on Fri, 10/26/2018 - 3:51pm
reliable transmission
LDPC codes
legitimate channel
legitimate receiver
legitimate recipient request
parity check codes
physical layer security
pubcrawl
received symbols likelihood computations
Receivers
Reliability
intended receiver
Resiliency
retransmitted packets
Scalability
secure transmission
security
Signal to noise ratio
telecommunication security
transmission techniques
wireless communications systems
decoding process
additive noise Gaussian wiretap channel
Automatic repeat request
BCH codes
better channel conditions
channel capacity
channel codes
channel coding
coded packets
Conferences
Decoding
adaptive granular HARQ
eavesdropper
equal channel conditions
error correction codes
error statistics
feedback transmitted packets
forward error correction
granular subpackets
HARQ retransmission requests
hybrid automatic repeat-request protocol
biblio
Two- and three-laser chaos communications
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
optical communication
two-laser chaos communications
three-laser chaos communications
telecommunication security
Synchronization
symmetrical topology
standard short cavity close-loop laser schemes
secure transmission
secure data exchange
Resiliency
pubcrawl
privacy
chaotic communication
optical chaotic cryptography
optical chaos
Metrics
laser cavity resonators
data privacy
Cryptography
composability
Communication system security
closed loop systems
chaotic cryptography