Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Receivers
biblio
Anonymous scheme for blockchain atomic swap based on zero-knowledge proof
Submitted by grigby1 on Thu, 03/04/2021 - 2:05pm
cryptocurrencies
pubcrawl
Human Factors
policy-based governance
resilience
Resiliency
data privacy
Scalability
privacy
Protocols
contracts
Receivers
Public key
privacy leakage
Elliptic curves
smart contract
transaction processing
anonymous improvement scheme
anonymous list
anonymous scheme
atomic exchange
blockchain atomic swap
self-certification
smart contract address information
UTXO unconsumed model
zero-knowledge proof
zero trust
biblio
Adversarial multiple access channels and a new model of multimedia fingerprinting coding
Submitted by grigby1 on Tue, 02/23/2021 - 1:35pm
security of data
security
pubcrawl
Metrics
resilience
Resiliency
Conferences
Mathematical model
privacy
composability
encoding
Information systems
Receivers
Binary codes
broadcast channels
channel coding
error statistics
network coding
compressed sensing
Watermarking
multimedia computing
adders
Multimedia communication
A-channel
adversarial multiple access channels
arbitrary coefficients
binary adder channel
collusion attack
digital fingerprint
digital fingerprinting code
digital fingerprinting coding problems
linear combinations
malicious multiple access channels
multi-access systems
multimedia fingerprinting code
multiple access channel
noise-like signals
zero-error probability
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
banking applications
Ciphers
Ciphertext
Cryptography
Data Security
DCT coefficients
discrete cosine transform
discrete cosine transforms
ECC algorithm
Elliptic curve cryptography
Hill Cipher
Hill cipher algorithm
image enhancement
image watermarking
information cloning
information security
least significant bit
LSB watermarking
Metrics
pubcrawl
public key cryptography
Receivers
Resiliency
Scalability
Signal processing algorithms
Smart Systems
Steganography
suboptimal multimedia applications
tampering counterfeiting
uncompensatory loss
unsecured operating systems
weak security
biblio
On Countermeasures Against the Thermal Covert Channel Attacks Targeting Many-core Systems
Submitted by grigby1 on Wed, 02/10/2021 - 11:52am
security of data
pubcrawl
resilience
Resiliency
Scalability
thermal noise
multiprocessing systems
Receivers
Compositionality
Transmitters
Temperature sensors
error statistics
covert channels
Bit error rate
signal detection
Multicore processing
critical defense issue
Defense against Covert Channel Attack
DVFS technique
dynamic voltage frequency scaling technique
Many-core systems
manycore systems
signal frequency scanning
TCC attack
Thermal Covert Channel
thermal covert channel attacks
three-step countermeasure
biblio
Covert Communication by Exploiting Node Multiplicity and Channel Variations
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
pubcrawl
resilience
Resiliency
Throughput
telecommunication security
Scalability
Wireless communication
radio networks
Receivers
Compositionality
wireless channels
uncertainty
Transmitters
broadcast channels
covert message
error probability
error statistics
covert communication
Information hiding
covert channels
channel variation
detection error probability
detection probability
low probability of detection (LPD)
node multiplicity
noncovert message
noncovert users
pre-shared secret
private message
Propagation losses
superposition coding
wireless broadcast networks
biblio
CloakLoRa: A Covert Channel over LoRa PHY
Submitted by grigby1 on Wed, 02/10/2021 - 11:51am
Cryptography
security
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Payloads
Buildings
Receivers
Compositionality
wireless channels
covert channels
data encapsulation
Frequency modulation
Cascading style sheets
Chirp
software radio
covert communication
amplitude modulated covert channel
amplitude modulation
CloakLoRa
COTS LoRa nodes
covert information
differentiate LoRa symbols
lora
LoRa chirps
LoRa PHY
LoRa physical layer
regular LoRa node
regular LoRa packet
spread spectrum communication
unique modulation scheme
biblio
Order-Optimal Scaling of Covert Communication over MIMO AWGN Channels
Submitted by grigby1 on Wed, 02/10/2021 - 11:50am
pubcrawl
resilience
Resiliency
telecommunication security
Scalability
Reliability
Receivers
Compositionality
probability
channel capacity
channel coding
physical layer security
covert communication
covert channels
additive white Gaussian noise channels
AWGN channels
discrete memoryless channels
MIMO communication
secrecy capacity
blocklength
covert nats
effective secrecy
energy undetectability constraints
LPD communication
maximal covert coding rate
MIMO AWGN channels
multiple-input multiple-output AWGN channels
order-optimal scaling law
square root law
stealth communication
unit-rank MIMO
Zinc
biblio
File Encryption and Decryption Using DNA Technology
Submitted by aekwall on Mon, 02/08/2021 - 12:50pm
Cryptography
encryption
Conferences
Receivers
Resiliency
Human behavior
pubcrawl
privacy
DNA
public key cryptography
Predictive Metrics
data hiding
encoding
decryption
DNA cryptography
DNA sequence
appropriate form
arbitrary keys generation
authorized persons
binary-coded form
common key
cryptographic process
data forwarding
data hijacking
data transmutation
deoxyribo nucleic acid sequence
DNA technology
file decryption
file encryption
intermediate steps
original texted message
unknown form
users data security
biblio
Using a Blend of Brassard and Benett 84 Elliptic Curve Digital Signature for Secure Cloud Data Communication
Submitted by aekwall on Mon, 02/08/2021 - 12:47pm
Elliptic curve cryptography
pubcrawl
Scalability
Resiliency
Metrics
authentication
BB84
Cloud Computing
Cryptographic Protocols
data exchange
digital signatures
elliptic curve
elliptic curve digital signature
elliptic curve digital signature algorithm (ECDSA)
Elliptic curves
malicious client
public key cryptography
quantum computing
Quantum Key Distribution
Receivers
secure cloud data communication
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
Scalability
digital signature
Cryptography
decryption
private key cryptography
Receivers
information security
network security
Resiliency
pubcrawl
Image coding
Image color analysis
message authentication
digital signatures
encryption
Public key
public key cryptography
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
cover image
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
1
2
3
4
5
6
7
8
9
…
next ›
last »