Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
passive eavesdropper
biblio
Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers
Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
source coding
pubcrawl
public channel
public key cryptography
Relays
resilience
Resiliency
Scalability
secret keys
security
policy-based governance
source coding scheme
source sequences
source-type model
telecommunication security
Telecommunications
trusted helper
untrusted helper
Upper bound
Indexes
cooperative communication
cooperative key generation
cooperative two-key generation
Decoding
discrete memoryless sources
five-terminal system
generated keys
Human behavior
Human Factors
channel capacity
information theoretic security
information-theoretic security
key capacity region
key leakage rate
Metrics
partial-trusted helpers
passive eavesdropper
physical layer security
biblio
Security for Minimum Storage Regenerating Codes and Locally Repairable Codes
Submitted by grigby1 on Mon, 03/05/2018 - 1:08pm
MR codes
telecommunication security
security
secure storage codes
Secure storage
Resiliency
resilience
repair efficient distributed storage systems
pubcrawl
precoding
passive eavesdropper
outer coset code
MSR codes
Bandwidth
minimum storage regenerating codes
Metrics
maximally recoverable codes
maintenance engineering
LRC codes
locally repairable codes
inner storage code
Cryptography
Compositionality
coding theory
codes
biblio
Secure key management for 5G physical layer security
Submitted by grigby1 on Wed, 02/21/2018 - 1:40pm
Scalability
next generation 5G wireless networks
parity check codes
passive eavesdropper
Physical layer
physical layer security
pubcrawl
resilience
Resiliency
network security
secure key management
Signal to noise ratio
telecommunication security
unsecured wireless medium
very high error probability
Wireless communication
wiretap channel
LDPC codes
Communication system security
Correlation
diversity order
eavesdropping channels
error statistics
Human behavior
key management
LDPC
5G mobile communication
legitimate communication parties
legitimate receiver
legitimate transmitter
legitimate users
low density parity check codes
Metrics
mobility management (mobile radio)