Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Multi-user
biblio
A Novel Physical Layer Authentication Method with Convolutional Neural Network
Submitted by aekwall on Mon, 08/10/2020 - 9:36am
MIMO-OFDM system security
Artificial Neural Networks
MIMO communication
spoofing attacks
channel authentication
convolutional-neural-network-based approach
hypothesis test based methods
L1 regularization
MIMO-OFDM
OFDM
mini batch scheme
Multi-user
multiple-input multiple-output system
multiuser authentication system
OFDM modulation
orthogonal frequency division multiplexing
physical layer authentication method
radio transmitters
authentication
Resiliency
pubcrawl
policy-based governance
Wireless communication
CNN
convolutional neural nets
convolutional neural network
convolutional neural networks
telecommunication security
physical layer security
convolution
cyber physical systems
authentication accuracy
multi-access systems
wireless networks
channel state information
CSI
biblio
A Verifiable Dynamic Multi-user Searchable Encryption Scheme without Trusted Third Parties
Submitted by grigby1 on Wed, 03/18/2020 - 11:15am
trusted third party
resilience
Resiliency
composability
pubcrawl
weak trust
verification
verifiable multiuser searchable encryption schemes
verifiable dynamic multiuser searchable encryption scheme
user search permissions
user permission
user access permission matrices
Cryptography
secure data sharing
multiuser settings
multiuser searchable encryption schemes
dynamic management
Multi-user
encrypted data
searchable encryption
public key cryptography
cloud server
Cloud Computing
authorisation
biblio
Probably Secure Multi-User Multi-Keyword Searchable Encryption Scheme in Cloud Storage
Submitted by grigby1 on Thu, 09/26/2019 - 9:27am
Multi-user
Trapdoor indistinguishability
simulation program
Servers
security
secure multiuser multikeyword searchable encryption scheme
searchable encryption server
Resiliency
resilience
Receivers
random oracle model
public key cryptography
Public key
pubcrawl
privacal data
searchable encryption
multi-keyword
Indexes
encryption workload
encryption
decisional Diffie-Hellman
data user
data privacy
data owner
Cryptography
composability
cloud storage
Cloud Computing
cipher text keyword