Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secret key generation
biblio
On the RIS Manipulating Attack and Its Countermeasures in Physical-Layer Key Generation
Submitted by grigby1 on Tue, 01/11/2022 - 10:36am
reconfigurable intelligent surfaces
Wireless communication
Vehicular and wireless technologies
simulation
secret key generation
Scalability
Resiliency
resilience
reflection coefficient
active attack
reconfigurable intelligent surface
Quantization (signal)
pubcrawl
physical layer security
OFDM
Metrics
attack surface
biblio
A Novel Key Generation Approach Based on Facial Image Features for Stream Cipher System
Submitted by grigby1 on Tue, 08/31/2021 - 12:09pm
Pseudo random number
Streaming media
stream cipher system
secret key generation
Scalability
Resiliency
resilience
random key generation
pubcrawl
Ciphers
Metrics
Mathematical model
linear feedback shift register
Human behavior
Generators
feature extraction
encryption
biblio
Secret Key Attaches in MIMO IoT Communications by Using Self-injection Artificial Noise
Submitted by aekwall on Tue, 08/17/2021 - 4:16pm
delays
Scalability
pubcrawl
Metrics
Resiliency
Human behavior
Physical layer
IoT security
key management
Binary phase shift keying
Signal to noise ratio
MIMO communication
physical layer security
receiving antennas
secret key generation
Secret key sharing
biblio
Achieving one-time pad via endogenous secret keys in wireless communication
Submitted by aekwall on Tue, 08/17/2021 - 4:16pm
key management
the one-time pad
Signal to noise ratio
secret key generation
resource management
physical layer security
Endogenous security
eavesdropping
Binary phase shift keying
security
Communication system security
Human behavior
Resiliency
Metrics
pubcrawl
Wireless communication
Scalability
biblio
Wireless Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
message protection
fading channels
information-theoretic security
information theoretic security
average secure communication
channel state information
Fading
imperfect channel state information
Information analysis
low-density parity-check (LDPC) codes
secure communication protocol
multilevel coding
optimized low-density parity-check codes
outage probability
Privacy Amplification
quasi static fading channel
secrecy capacity
secret key agreement
Wireless application protocol
Wireless Information-Theoretic Security
Metrics
data privacy
private key cryptography
telecommunication security
Resiliency
Human behavior
pubcrawl
policy-based governance
privacy
Communication system security
Scalability
probability
channel coding
parity check codes
Data Security
information security
wireless channels
protection
wireless channel
secret key generation
biblio
Performance Analysis of Concatenated Error Correction Code in Secret Key Generation System
Submitted by aekwall on Tue, 09/08/2020 - 10:05am
numerical analysis
third-party eavesdropping elimination
stream encryption
secret key generation schemes
secret key generation
second-level concatenated code
RS codes
numerical simulations
noninteractive information reconciliation scheme
information reconciliation
first-level error correction code
concatenated error correction code
BCH
a shortened RS (SRS)
wireless channel
Cryptography
BCH codes
Reed-Solomon codes
error correction codes
physical layer security
concatenated codes
channel coding
Decoding
Metrics
Wireless communication
composability
pubcrawl
Resiliency
encryption
biblio
Turing Meets Shannon: On the Algorithmic Computability of the Capacities of Secure Communication Systems (Invited Paper)
Submitted by grigby1 on Wed, 03/04/2020 - 4:15pm
active jammer
algorithmic computability
capacity expressions
communication scenarios
composability
Compositionality
Jamming
private key cryptography
pubcrawl
secret key generation
secure communication systems
theoretical cryptography
wiretap channel
biblio
Securing Industrial Wireless Networks: Enhancing SDN with PhySec
Submitted by aekwall on Mon, 01/13/2020 - 12:17pm
industrial landscape
sensors
software defined networking
network management
physical layer security
additional overhead
cryptographic procedures
cyber-physical production systems
cyber-security threats
industrial communication networks
network security
industrial wireless networks
interconnected devices
network security requirements
PhySec
secret key generation
transmission bandwidth
wireless solutions
actuator security
Communication system security
Cryptography
Internet of Things
Software
computer network management
Resiliency
Human behavior
pubcrawl
composability
computer network security
Wireless communication
Metrics
production engineering computing
software-defined networking
SDN
Communication networks
cyber security
radio networks
biblio
Phase Jamming Attack: A Practical Attack on Physical Layer-Based Key Derivation
Submitted by grigby1 on Wed, 11/27/2019 - 3:01pm
physical layer security
Wireless communication
Signal to noise ratio
security enhancement performance
security
secret keys
secret key generation
Resiliency
resilience
received signal phase quantisation
Quantization (signal)
pubcrawl
probability
physical-layer security
physical layer-based key derivation procedure
adversary signal transmission
Physical layer
phase quantization regions
phase jamming attack
phase attack
Metrics
key generation technique
jamming attack
Jamming
Cryptography
composability
Communication system security
communication management
communication channel networks
biblio
Analog cellular neural network for application in physical unclonable functions
Submitted by grigby1 on Thu, 04/20/2017 - 12:41pm
Resiliency
Monte Carlo simulation
network on chip
network on chip security
neural chips
Physically Unclonable Function (PUF)
physical unclonable function design
process variation
pubcrawl
PUF instances
Monte Carlo methods
Scalability
secret key generation
Semiconductor device modeling
size 45 nm
Trajectory
unclonable core module
unpolarized Gaussian-shaped distribution
word length 100 bit
CMOS technology
analogue circuits
cellular neural nets
Cellular Neural Network (CNN)
Cellular neural networks
challenge-response security system
circuit dynamical behavior
CMOS analogue integrated circuits
CMOS integrated circuits
analog cellular neural network
composability
Cryptography
device identification-authentication
Hamming distance
Hardware
Hardware Security
integrated circuit design
Integrated circuit modeling
1
2
next ›
last »