Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

suboptimal method-with-multiple adversaries

biblio

Visible to the public Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries

Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
  • radio networks
  • hidden Markov model
  • HMM
  • key extraction security analysis
  • legitimate wireless devices
  • multiple adversaries algorithm
  • OME algorithm
  • physical measurements
  • private communication
  • Heuristic algorithms
  • secret key extraction scheme
  • security evaluation metric
  • SOME algorithm
  • suboptimal method-with-multiple adversaries
  • Viterbi algorithm
  • wireless channels
  • wiretap channel model
  • Adversary Models
  • telecommunication security
  • pubcrawl
  • Human behavior
  • Metrics
  • Resiliency
  • Scalability
  • Hidden Markov models
  • computational complexity
  • Wireless communication
  • security
  • Communication system security
  • Entropy
  • approximate conditional min- entropy
  • Channel models
  • computation complexity reduction
  • dynamic programming
  • dynamic programming approach
  • exponential computation complexity

Terms of Use  |  ©2023. CPS-VO