Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
physical layer security
biblio
Secure Device Bootstrapping Without Secrets Resistant to Signal Manipulation Attacks
Submitted by grigby1 on Wed, 10/30/2019 - 10:53am
Secret free
industrial automation sensors
key establishment
key establishment processes
man in the middle attack
medical devices
Message Integrity Protection
multiple devices
multiple legitimate devices
ON OFF Keying
out-of-band channels
pairing process
physical layer security
physical-layer group message integrity
in-band message integrity verification
secure deployment
secure device bootstrapping
secure pairing
shared secrets
signal manipulation attacks
VERSE
wireless channel
wireless devices
wireless signal annihilation
wireless signal injection
Wireless Signal Manipulation Attack
wireless signal manipulations
Security by Default
Cryptographic Protocols
Internet of Things
security of data
resilience
wireless sensor networks
pubcrawl
Resiliency
Scalability
Protocols
Wireless communication
telecommunication security
message authentication
performance evaluation
Communication system security
authentication
authorisation
wireless channels
body area networks
public key cryptography
data integrity
autonomous vehicles
man-in-the-middle attacks
advanced wireless attacks
authenticated channels
bootstrapping protocol
extensive human involvement
Group Bootstrapping
hub
file
Robust Physical Layer Security with Limited Channel Knowledge
Submitted by Ravi Tandon on Mon, 10/21/2019 - 12:28pm. Contributors:
Ravi Tandon
J. D. Mutangana
M. Seif
D. Kumar
M. Li
Posters
information theoretic security
physical layer security
Theoretical Privacy
Theory Cryptography
wireless networking
1715947
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
A filter selection based physical layer security system
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
filter design
signal processing security
USRP
software radio
RRC
root raised cosine filters
Roll of factor
radio networks
physical layer security system
physical layer security method
physical layer security
Physical layer
filtering theory
filter selection
network security
EVM
eavesdropping attacks
eavesdropper
Signal to noise ratio
Metrics
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
telecommunication security
Receivers
Conferences
biblio
Post-quantum Security Using Channel Noise
Submitted by aekwall on Mon, 03/25/2019 - 9:56am
physical layer security
composability
Control Theory
finite-length regime
Human behavior
information theoretic security
information-theoretic security
Metrics
physical-layer security
post-quantum security
pubcrawl
Resiliency
security
sensor security
wiretap channel
biblio
Electromagnetic Induction Attacks Against Embedded Systems
Submitted by grigby1 on Mon, 01/21/2019 - 12:29pm
physical layer security
actuator security
composability
electromagnetic interference
embedded and cyber-physical systems
false-actuation attack
false-data injection
Human behavior
Metrics
physical-layer attack
pubcrawl
Resiliency
biblio
Impact of multipath reflections on secrecy in VLC systems with randomly located eavesdroppers
Submitted by grigby1 on Mon, 01/21/2019 - 12:21pm
light reflection
Visible Light Communications Security
VLC systems
stochastic geometry
Stimulated emission
secrecy viewpoint
secrecy outage probability
reflection
reflected light
randomly located eavesdroppers
randomly distributed eavesdroppers
probability
PLS
multipath reflections
Monte Carlo simulations
Monte Carlo methods
pubcrawl
light emitting diode configuration
legitimate user
legitimate information
free-space optical communication
physical layer security
optical transmitters
optical receivers
light emitting diodes
visible light communication
Signal to noise ratio
telecommunication security
Geometry
Scalability
Resiliency
Metrics
biblio
Secrecy Capacity of Indoor Visible Light Communication Channels
Submitted by grigby1 on Mon, 01/21/2019 - 12:20pm
channel capacity
Visible Light Communications Security
VLC system
visible light communications
Upper bound
peak optical intensity constraint
Optical noise
information theory principle
indoor VLC
indoor visible light communication channels
indoor scenario
future wireless communications
dimmable average optical intensity constraint
closed-form expressions
security
indoor communication
optical communication
secrecy capacity
physical layer security
optical transmitters
optical receivers
telecommunication security
Wireless communication
Scalability
Resiliency
Metrics
pubcrawl
biblio
A Method for Improving Physical Layer Security in Visible Light Communication Networks
Submitted by grigby1 on Mon, 01/21/2019 - 12:20pm
security
pubcrawl
Metrics
Resiliency
Scalability
Wireless communication
visible light communication
light emitting diodes
angle diversity transmitter
Interference
optical receivers
optical transmitters
physical layer security
secrecy capacity
Visible Light Communications Security
biblio
High Security Orthogonal Factorized Channel Scrambling Scheme with Location Information Embedded for MIMO-Based VLC System
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Scalability
OFCS-LIE
OFCS-LIE scheme
optical transmitters
orthogonal error
physical layer security
pubcrawl
Receivers
Reliability
resilience
Resiliency
resultant OFCS-LIE matrix
multiple-output channels
secrecy capacity
security
system security
system security analysis
telecommunication security
visible light beam
Visible Light Communications Security
visible light communication system confidentiality
visible light communication system privacy
wireless channels
Iterative methods
channel capacity
counterpart scrambling scheme
Cryptography
eavesdropper
free-space optical communication
high security orthogonal factorized channel scrambling scheme
Information Leakage
information transmission reliability
information transmission security
iteration number
Adaptive optics
iterative orthogonal factorization method
LIE matrix factorization
light emitting diodes
location information embedded matrix
Matrix decomposition
Metrics
MIMO-based VLC system
MIMO channels
MIMO communication
multiple-input
biblio
Physical layer security using BCH and LDPC codes with adaptive granular HARQ
Submitted by grigby1 on Fri, 10/26/2018 - 4:51pm
reliable transmission
LDPC codes
legitimate channel
legitimate receiver
legitimate recipient request
parity check codes
physical layer security
pubcrawl
received symbols likelihood computations
Receivers
Reliability
intended receiver
Resiliency
retransmitted packets
Scalability
secure transmission
security
Signal to noise ratio
telecommunication security
transmission techniques
wireless communications systems
decoding process
additive noise Gaussian wiretap channel
Automatic repeat request
BCH codes
better channel conditions
channel capacity
channel codes
channel coding
coded packets
Conferences
Decoding
adaptive granular HARQ
eavesdropper
equal channel conditions
error correction codes
error statistics
feedback transmitted packets
forward error correction
granular subpackets
HARQ retransmission requests
hybrid automatic repeat-request protocol
« first
‹ previous
…
9
10
11
12
13
14
15
16
17
next ›
last »