Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
secure communication
biblio
An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
Submitted by grigby1 on Fri, 07/29/2022 - 9:04am
Smart Grid
power grid vulnerability analysis
session key
trusted authority
key agreement
secure communication
Metrics
Smart Grids
Wireless communication
smart meters
tools
Protocols
authentication
Scalability
Resiliency
resilience
pubcrawl
security
privacy
biblio
Cognitive Radio Primary Network Secure Communication Strategy Based on Energy Harvesting and Destination Assistance
Submitted by grigby1 on Fri, 07/01/2022 - 10:21am
radio transmitters
spectral efficiency
Destination assistance
Cognitive Radio (CR)
beamforming
Artificial noise jamming signal
array signal processing
secure communication
Resiliency
pubcrawl
Cognitive Radio Security
physical layer security
cognitive radio
energy harvesting
simulation
Receivers
resilience
biblio
Chaos-based Cryptography Using an Underactuated Synchronizer
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
pubcrawl
Conferences
composability
chaotic communication
Compositionality
chaos
Synchronization
encryption
Sensitivity
Communications technology
Costs
Industry applications
Liu system
Lyapunov analysis
secure communication
theoretical cryptography
biblio
Blockchain Based Mutual Authentication for VoIP Applications with Biometric Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 1:14pm
authentication
Biological system modeling
biometrics (access control)
blockchain
blockchains
Elliptic curve cryptography
encryption
P2P network
privacy
pubcrawl
resilience
Resiliency
Scalability
secure communication
signature based defense
VoIP
biblio
Securing Smart Grid Communication Using Ethereum Smart Contracts
Submitted by grigby1 on Tue, 11/30/2021 - 3:04pm
blockchain
Companies
computer architecture
contracts
ethereum
IoT
Metrics
pubcrawl
resilience
Resiliency
Scalability
secure communication
Smart Grid
Smart Grids
smart grid security
smart meters
biblio
Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation
Submitted by aekwall on Wed, 07/07/2021 - 4:46pm
secure communication
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
ubiquitous computing
Smart Home
Smart City
security
Mobile wireless sensor networks
mobile ad hoc networks
military computing
Games
data privacy
wireless sensor networks
Human Factors
Monitoring
biblio
The Million Dollar Handshake: Secure and Attested Communications in the Cloud
Submitted by grigby1 on Wed, 05/05/2021 - 12:58pm
Remote Attestation
Virtual machining
standards
Software
secure enclaves
secure communication
Scalability
sandboxing
rendering (computer graphics)
attestation
pubcrawl
Protocols
policy-based governance
composability
Communication channels
collaboration agreements
collaboration
Cloud Computing
biblio
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
phase encoding framework
decoder estimate
distributed source coding
distributed source coding perspective
Fourier-Mellin transform
hash security
image hashing
minimal hash size
minimal information exchange
central server
Phase spectrum
reference image
rigid image registration
rigid image registration technique
secure image hash-based geometric transformations estimation
signal processing applications
transformation parameters
computational complexity
information security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Bandwidth
Cryptography
Forensics
image registration
source coding
information forensics
Image coding
secure communication
secure transmission
biblio
Residual Energy Analysis with Physical-Layer Security for Energy-Constrained UAV Cognitive Radio Systems
Submitted by aekwall on Mon, 03/15/2021 - 12:03pm
cognitive radio
Cognitive Radio Security
sensing performance
secrecy outage
secondary link performance
residual energy analysis
energy-constraint
energy-constrained UAV cognitive radio systems
energy harvesting drone
Unmanned Aerial Vehicles
telecommunication security
energy harvesting
autonomous aerial vehicles
constrained optimization problem
secure communication
physical-layer security
residual energy
optimisation
pubcrawl
Resiliency
biblio
Secure Communication Based on Reliability-Based Hybrid ARQ and LDPC Codes
Submitted by grigby1 on Tue, 02/23/2021 - 2:36pm
physical-layer security
additive white gaussian noise channel
additive white Gaussian noise wire-tap channel
Automatic repeat request
bit-error rate
Gaussian approximation
hybrid ARQ
irregular LDPC codes
low-density parity-check codes.
secure communication
posteriori probability log-likelihood ratios
RB-HARQ protocol
re-transmission strategy
re-transmissions
reliability-based hybrid ARQ
reliability-based hybrid automatic repeat-request
unreliable bits
variable nodes
Decoding
Metrics
resilience
Resiliency
telecommunication security
composability
probability
security performance
communication system
pubcrawl
telecommunication network reliability
channel coding
error statistics
network coding
low-density parity-check codes
AWGN channels
parity check codes
1
2
3
4
5
next ›
last »