Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Wireless communication
biblio
Strategy to Increase RFID Security System Using Encryption Algorithm
Submitted by grigby1 on Fri, 03/17/2023 - 12:52pm
encryption
Internet of Things
security
IoT
pubcrawl
resilience
Resiliency
5G mobile communication
Wireless communication
microcontrollers
RFID
Telematics
Human Factors
RFIDs
Espresso Algorithm
Grain v1 Algorithm
biblio
SemKey: Boosting Secret Key Generation for RIS-assisted Semantic Communication Systems
Submitted by grigby1 on Fri, 03/17/2023 - 11:35am
resilience
Semantic Communication
physical layer key generation
intelligent reflecting surface
random key generation
Resiliency
Vehicular and wireless technologies
surveillance
Transmitters
pubcrawl
Semantics
Receivers
Switches
Wireless communication
Scalability
Metrics
Human Factors
Human behavior
biblio
Physical-Layer Security for THz Communications via Orbital Angular Momentum Waves
Submitted by grigby1 on Fri, 03/17/2023 - 11:35am
modulation
Terahertz
OAM modes
Orbits
orbital angular momentum
random key generation
Resiliency
physical-layer security
receiving antennas
physical layer security
pubcrawl
resilience
Wireless communication
Protocols
Scalability
Generators
Metrics
Human Factors
Human behavior
biblio
Lightweight Stream Ciphers based on Chaos for Time and Energy Constrained IoT Applications
Submitted by aekwall on Fri, 03/03/2023 - 10:58am
Ciphers
Lightweight Ciphers
energy con-strained devices
chaotic stream ciphers
chaos
lightweight cryptography
Costs
smart cards
cyber-physical systems
security
Resiliency
Scalability
pubcrawl
Wireless communication
performance evaluation
Internet of Things
wireless sensor networks
biblio
Proof-of-Concept of Network Key Management Using Lattice-Based Cryptography
Submitted by aekwall on Fri, 03/03/2023 - 10:52am
Human behavior
key encapsulation mechanism
GGH
Encapsulation
key management
lattice-based cryptography
iiot
Memory management
Industries
IoT
Resiliency
Metrics
Scalability
pubcrawl
Public key
Wireless communication
optimization
Couplings
biblio
The Design of Campus Security Early Warning System based on IPv6 Wireless Sensing
Submitted by grigby1 on Fri, 02/24/2023 - 5:31pm
sensors
wireless sensing
CSI
Alarm systems
Personnel
video surveillance
IPv6
Policy Based Governance
real-time systems
collaboration
composability
Wireless communication
wireless sensor networks
Resiliency
resilience
Metrics
pubcrawl
security
biblio
Decentralizing loT Public- Key Storage using Distributed Ledger Technology
Submitted by grigby1 on Fri, 02/17/2023 - 5:18pm
Resistance
public-key
loT
file storage
scalable verification
Distributed Ledger Technology
distributed ledger
Tamper-Resistance
Performance analysis
Public key
pubcrawl
Compositionality
smart contracts
Wireless communication
Protocols
Scalability
Resiliency
resilience
Metrics
biblio
A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme
Submitted by aekwall on Fri, 02/17/2023 - 10:49am
Resiliency
Safe Coding
video sequences
Linear Block Code
Hamming Code
embedding payload
renewable energy sources
Motion pictures
policy-based governance
security
Metrics
pubcrawl
Wireless communication
video recording
Steganography
Human Factors
Software
biblio
An End-to-End System for Monitoring IoT Devices in Smart Homes
Submitted by aekwall on Fri, 02/17/2023 - 10:46am
visualization
Cloud Computing
Internet of Things
Protocols
Wireless communication
pubcrawl
Resiliency
Smart homes
telecommunication traffic
Predictive Metrics
Router Systems Security
biblio
An Autonomous Vehicle Group Formation Method based on Risk Assessment Scoring
Submitted by grigby1 on Fri, 02/03/2023 - 5:20pm
Computational modeling
vehicle group formation
risk assessment scoring
autonomous vehicle group
Pervasive Computing Security
Human Factors
simulation
Measurement
Wireless communication
Cloud Computing
Scalability
Resiliency
resilience
Metrics
pubcrawl
security
Predictive models
« first
‹ previous
1
2
3
4
5
6
7
8
9
…
next ›
last »