Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

five-terminal system

biblio

Visible to the public Cooperative Two-Key Generation in Source-Type Model With Partial-Trusted Helpers

Submitted by grigby1 on Tue, 06/02/2020 - 11:54am
  • source coding
  • pubcrawl
  • public channel
  • public key cryptography
  • Relays
  • resilience
  • Resiliency
  • Scalability
  • secret keys
  • security
  • policy-based governance
  • source coding scheme
  • source sequences
  • source-type model
  • telecommunication security
  • Telecommunications
  • trusted helper
  • untrusted helper
  • Upper bound
  • Indexes
  • cooperative communication
  • cooperative key generation
  • cooperative two-key generation
  • Decoding
  • discrete memoryless sources
  • five-terminal system
  • generated keys
  • Human behavior
  • Human Factors
  • channel capacity
  • information theoretic security
  • information-theoretic security
  • key capacity region
  • key leakage rate
  • Metrics
  • partial-trusted helpers
  • passive eavesdropper
  • physical layer security

Terms of Use  |  ©2023. CPS-VO