Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
suboptimal method-with-multiple adversaries
biblio
Security Analysis of Key Extraction from Physical Measurements with Multiple Adversaries
Submitted by grigby1 on Mon, 01/21/2019 - 12:38pm
radio networks
hidden Markov model
HMM
key extraction security analysis
legitimate wireless devices
multiple adversaries algorithm
OME algorithm
physical measurements
private communication
Heuristic algorithms
secret key extraction scheme
security evaluation metric
SOME algorithm
suboptimal method-with-multiple adversaries
Viterbi algorithm
wireless channels
wiretap channel model
Adversary Models
telecommunication security
pubcrawl
Human behavior
Metrics
Resiliency
Scalability
Hidden Markov models
computational complexity
Wireless communication
security
Communication system security
Entropy
approximate conditional min- entropy
Channel models
computation complexity reduction
dynamic programming
dynamic programming approach
exponential computation complexity