Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
wireless security
biblio
Cooperative Key Generation for Data Dissemination in Cyber-Physical Systems
Submitted by aekwall on Mon, 09/28/2020 - 11:10am
Protocols
wireless sensor networks
wireless security
wireless fading channel
Wireless communication
wireless channels
telecommunication security
shared randomness
sensory data
secret key generation protocol
secret bit mismatch
real-time data dissemination
radio channels
quantized fading channel randomness
Quantization (signal)
pubcrawl
2-hop wireless sensor network testbed
privacy
Human Factors
Human behavior
fading channels
Experimental Evaluation
data dissemination
cyber-physical systems
cyber physical systems
Cryptographic Protocols
CPS Privacy
CPS
confidentiality
Communication system security
communication security
biblio
Lightweight Mutual Authentication and Key Agreement in IoT Networks and Wireless Sensor Networks Proposal of Authentication and Key Agreement in IoT Network and Sensor Network Using Poor Wireless Communication of Less Than 1 Kbps
Submitted by aekwall on Mon, 03/25/2019 - 8:57am
Metrics
Zigbee
WSN security
wireless sensor networks
wireless security
wireless communication devices
Wireless communication
telecommunication security
sensor security
Resiliency
pubcrawl
poor wireless communication
performance evaluation
mutual authentication
authentication
low-performance sensors
low performance communication ability
lightweight mutual authentication
key agreement
IoT security
IoT network
Internet of Things
Human behavior
high-quality communication
Cryptographic Protocols
composability
communication functions
biblio
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
Submitted by grigby1 on Tue, 09/05/2017 - 12:50pm
channel state information
composability
digital signal processing
keystroke analysis
Metrics
online payment
password inference
privacy
pubcrawl
Resiliency
signal processing security
Traffic analysis
wireless security
file
Game Theory Meets Network Security and Privacy
Submitted by awhitesell on Thu, 02/09/2017 - 3:06pm
Science of Security
Cryptography
game theory
intrusion detection system
location privacy
multiparty computation
network security and privacy
NSA SoS Lablets Materials
revocation
Science of Security
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
UIUC
wireless security
UIUC
NSA SoS Lablets Materials
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
biblio
Game Theory Meets Network Security and Privacy
Submitted by awhitesell on Thu, 02/09/2017 - 12:12pm
Science of Security
NSA SoS Lablets Materials
Science of Security
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
UIUC
game theory
network security and privacy
intrusion detection system
location privacy
revocation
wireless security
Cryptography
multiparty computation
UIUC
NSA SoS Lablets Materials
Toward a Theory of Resilience in Systems: A Game-Theoretic Approach
biblio
Toward Wireless Security without Computational Assumptions #x2014;Oblivious Transfer Based on Wireless Channel Characteristics
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
polynomial-time computable function
wireless security
wireless devices
Wireless communication
wireless channels
wireless channel characteristics
transport protocols
security
Protocols
Probes
private communications
privacy preserving password verification
1-out-of-2 oblivious transfer protocol
physical channel characteristics
Oblivious transfer
data privacy
Cryptography
cryptographic tools
Cryptographic Protocols
cryptographic protocol
computational complexity
computational assumptions
Communication system security
Channel estimation
file
CAREER: EASE: Enhancing the Security of Pervasive Wireless Networks by Exploiting Location
Submitted by Katie Dey on Sun, 12/09/2012 - 7:29pm. Contributor:
Yingying (Jennifer) Chen
ABSTRACT
SaTC Posters
localization
location information
pervasive wireless networks
Stevens Institute of Technology
wireless security
0954020
SaTC PI Meeting 2012
Academia
Poster
file
Making Physical Inferences to Enhance Wireless Security
Submitted by Katie Dey on Mon, 12/03/2012 - 5:54pm. Contributors:
YingYing Chen
Jie Yang
ABSTRACT
channel state information
Oakland University
physical layer information
Stevens Institute of Technology
wireless security
Academia
Poster
Posters
Science of Security Community Meeting, Nov '12
Secret Key Generation
« first
‹ previous
1
2