Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Zinc
biblio
Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels
Submitted by grigby1 on Wed, 02/10/2021 - 11:50am
discrete memoryless channels
Zinc
unit-rank MIMO
stealth communication
square root law
order-optimal scaling law
multiple-input multiple-output AWGN channels
MIMO AWGN channels
maximal covert coding rate
LPD communication
energy undetectability constraints
effective secrecy
covert nats
blocklength
secrecy capacity
MIMO communication
pubcrawl
AWGN channels
additive white Gaussian noise channels
covert channels
covert communication
physical layer security
channel coding
channel capacity
probability
Compositionality
Receivers
Reliability
Scalability
telecommunication security
Resiliency
resilience
biblio
Fully Secure Decentralized Key-Policy Attribute-Based Encryption
Submitted by grigby1 on Fri, 07/24/2020 - 11:32am
group theory
Zinc
standard model
Scalability
pubcrawl
private key encryption
private key cryptography
policy-based governance
monotonic access structure
LSSS
linear secret sharing scheme
KP-ABE scheme
KP-ABE
key policy attribute based encryption
Indexes
AA
global identifier
GID
Games
game theory
fully secure single-authority KP-ABE system
fully secure
encryption
Educational institutions
decentralized key-policy attribute-based encryption
decentralized
collaboration
central authority
CA
Attribute authority
biblio
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
Submitted by grigby1 on Thu, 02/14/2019 - 10:12am
exponential strong converse theorem
theoretical cryptography
Zinc
source coding
signal estimation
side channel-attacks
Shannon cipher system
secrecy bounds
Random variables
one helper source coding problem
information theory
information theoretical analysis
privacy
distributed sensors
Communication channels
bounded storage eavesdropper
Ciphers
side-channel attacks
Decoding
Compositionality
Cryptography
telecommunication security
composability
pubcrawl
biblio
Quantifying equivocation for finite blocklength wiretap codes
Submitted by grigby1 on Fri, 10/26/2018 - 3:52pm
forward error correction
Zinc
Wireless communication
security
Scalability
Resiliency
quantifying equivocation
pubcrawl
Monte Carlo strategy
Monte Carlo methods
mirrors technique
algebraic codes
forward error correcting codes
finite blocklength wiretap codes
error correction codes
encoding
Decoding
coset-based wiretap codes
Channel models
channel coding
binary erasure wiretap channel
Binary codes