Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
channel noise
biblio
Covert Communications-Based Information Reconciliation for Quantum Key Distribution Protocols
Submitted by grigby1 on Thu, 07/16/2020 - 11:19am
quantum bit-error rate
parity bits
Photonics
polarization entanglement
Protocols
pubcrawl
QBER
QKD
QKD protocol
QKD system
optical transmitters
quantum channel
quantum cryptography
quantum key distribution protocol
resilience
Resiliency
Scalability
secure key rates
unsecure key
covert channels
authenticated public channel
BB84 protocol
Bit error rate
Bragg gratings
channel loss
channel noise
composability
Compositionality
Adaptive optics
covert communication
covert communication channel
covert communications-based information reconciliation
Cryptographic Protocols
detector noise
error statistics
Jamming
noiseless public channel
biblio
Joint Source-Channel Coding for the Transmission of Correlated Sources over Two-Way Channels
Submitted by aekwall on Mon, 11/25/2019 - 1:06pm
correlation-preserving coding scheme
two-way lossy transmission
two-way channels
source-channel system
rate-one separate source-channel coding
Propagation losses
Network information theory
lossy transmission
joint source-channel coding scheme
joint source-channel coding
hybrid digital-analog coding
hybrid coding
genie-aided argument
DM-TWC
discrete-memoryless two-way channels
Resiliency
channel noise
adaptive coding
adaptive codes
combined source-channel coding
channel coding
distortion
Indexes
channel capacity
Correlation
Decoding
Metrics
composability
pubcrawl
biblio
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network
Submitted by grigby1 on Fri, 10/26/2018 - 3:53pm
INFECT
wireless openaccess research platform
wireless LAN
Trojan horses
Signal to noise ratio
security
Scalability
Robustness
Resiliency
radio transmitters
radio receivers
radio networks
pubcrawl
802.11a/g transmitter
inconspicuous FEC-based trojan
hardware attack
forward error correction
FEC encoding
Decoding
Contamination
channel noise profiling
channel noise
channel coding
Binary phase shift keying
802.11a/g wireless network