Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wiretap channel
biblio
Implementation of Physical Layer Security into 5G NR Systems and E2E Latency Assessment
Submitted by grigby1 on Fri, 09/01/2023 - 2:23pm
Compositionality
modular coding scheme
Software-defined radio
Downlink
Human Factors
codes
URLLC
wiretap channel
physical layer security
3GPP
5G
information theoretic security
collaboration
encoding
delays
composability
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
biblio
A Polar Coding Scheme for Achieving Secrecy of Fading Wiretap Channels in UAV Communications
Submitted by grigby1 on Fri, 04/14/2023 - 3:53pm
channel coding
UAV communication
polar coding
autonomous aerial vehicles
Symbols
Resiliency
secrecy capacity
wiretap channel
physical layer security
pubcrawl
fading channels
channel capacity
Transmitters
reliability theory
Metrics
composability
Wireless communication
resilience
biblio
Experimental Evaluation of a Modular Coding Scheme for Physical Layer Security
Submitted by aekwall on Thu, 12/01/2022 - 4:24pm
security
simulation
Measurement
Metrics
Resiliency
composability
encoding
Decoding
physical layer security
Error analysis
wiretap channel
modular scheme
Software-defined radio
biblio
Physical-Layer Security for 5G Wireless Networks: Sharing Non-Causal CSI with the Eavesdropper
Submitted by aekwall on Fri, 07/01/2022 - 9:48am
security
5G mobile communication
Reliability
Wireless communication
pubcrawl
Metrics
Resiliency
composability
encoding
Communication system security
Data protection
channel state information
physical-layer security
wiretap channel
channel coding
biblio
On the information leakage of finite block-length wiretap polar codes
Submitted by grigby1 on Fri, 07/01/2022 - 8:30am
Physical layer
wiretap channel
information theory
Equivocation
Information Leakage
Resiliency
polar codes
coding theory
physical layer security
security
Decoding
Complexity theory
Task Analysis
Metrics
estimation
resilience
pubcrawl
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 1:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
Robust Chaos-Based Information Masking Polar Coding Scheme for Wiretap Channel in Practical Wireless Systems
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
flat-fading Rayleigh channels
polar codes
telecommunication network reliability
Channel models
bit-channels
secure polar coding scheme
legitimate users
polar coding scheme
eavesdropping channel conditions
channel polarization
legitimate channels
realistic channel conditions
reliability performances
robust chaos-based information masking
security performances
transmission conditions
wireless communication systems
telecommunication security
Rayleigh channels
AWGN channels
wireless channels
chaotic communication
encoding
wiretap channel
channel coding
Reliability
Decoding
Metrics
Wireless communication
composability
pubcrawl
Resiliency
security
biblio
Turing Meets Shannon: On the Algorithmic Computability of the Capacities of Secure Communication Systems (Invited Paper)
Submitted by grigby1 on Wed, 03/04/2020 - 4:15pm
active jammer
algorithmic computability
capacity expressions
communication scenarios
composability
Compositionality
Jamming
private key cryptography
pubcrawl
secret key generation
secure communication systems
theoretical cryptography
wiretap channel
biblio
Frozen Bit Selection Scheme for Polar Coding Combined with Physical Layer Security
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
Metrics
wiretap channel
telecommunication security
symmetric α-stable distribution
security
secrecy rate
Resiliency
resilience
Receivers
pubcrawl
Protocols
polar coding scheme
polar codes
physical layer security
channel coding
legitimate users
impulsive noise
frozen bit selection scheme
frozen bit
error statistics
eavesdropper
density evolution
Decoding
composability
bit-error rate
BER
Automatic repeat request
ARQ protocol
biblio
Post-quantum Security Using Channel Noise
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
physical layer security
composability
Control Theory
finite-length regime
Human behavior
information theoretic security
information-theoretic security
Metrics
physical-layer security
post-quantum security
pubcrawl
Resiliency
security
sensor security
wiretap channel
1
2
next ›
last »