Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
codes
biblio
Highly Secured all Optical DIM Codes using AND Gate
Submitted by grigby1 on Tue, 02/23/2021 - 1:37pm
Logic gates
security
pubcrawl
Metrics
resilience
Resiliency
composability
telecommunication traffic
Q-factor
network coding
Optical fibers
codes
Optical fiber networks
interference suppression
Integrated optics
AND Gate
code division multiple access
correlation methods
Diagonal Identity Matrix (DIM)
highly secured all optical DIM codes
MAI reduction
multiple access interference
multiple access interference (MAI)
optical amplifiers
optical code division multiple access
Optical Code Division Multiple Access system (OCDMA)
optical communication equipment
optical diagonal identity matrices codes
optical gating
optical logic
optical systems
regularly expanding information traffic
semiconductor optical amplifier
Semiconductor optical amplifiers
spectral amplitude coding-OCDMA systems
zero cross-correlation
Zero Cross-Correlation (ZCC)
biblio
GCSA Codes with Noise Alignment for Secure Coded Multi-Party Batch Matrix Multiplication
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
batch processing
codes
coding theory
colluding servers
Compositionality
computational complexity
computer network security
Cross Subspace Alignment codes
Cryptography
flexible interserver network topology
GCSA codes
GCSA-NA
master gains no additional information
matrix multiplication
Metrics
network servers
noise alignment
pairwise products
polynomial sharing
polynomials
pubcrawl
resilience
Resiliency
secure interserver communication
secure multiparty batch matrix multiplication problem
security
SMBMM
synchronisation
telecommunication network topology
biblio
Secure Determinant Codes: A Class of Secure Exact-Repair Regenerating Codes
Submitted by grigby1 on Fri, 09/18/2020 - 12:47pm
security of data
security
pubcrawl
resilience
Resiliency
Cryptography
storage management
maintenance engineering
Redundancy
Metrics
Bandwidth
Compositionality
Upper bound
information theory
coding theory
linear codes
Manganese
codes
Distributed storage system
information-theoretic secrecy
per-node storage
repair bandwidth
secure determinant codes
secure exact-repair regenerating codes
biblio
Dine and Dash: Static, Dynamic, and Economic Analysis of In-Browser Cryptojacking
Submitted by grigby1 on Fri, 07/10/2020 - 12:07pm
code complexities
code-based categorization
codes
computer network security
Cryptography
cryptojacking
cryptojacking attackers
cryptojacking scripts
dropzone cryptojacking server
dynamic analysis
economic analysis
Human behavior
Human Factors
in-browser cryptojacking
internet
Java
malicious JavaScript codes
Metrics
pubcrawl
resilience
Resiliency
static analysis
Unsupervised Learning
Web browser fingerprinting
Web sites
biblio
Security for Minimum Storage Regenerating Codes and Locally Repairable Codes
Submitted by grigby1 on Mon, 03/05/2018 - 12:08pm
Bandwidth
codes
coding theory
Compositionality
Cryptography
inner storage code
locally repairable codes
LRC codes
maintenance engineering
maximally recoverable codes
Metrics
minimum storage regenerating codes
MR codes
MSR codes
outer coset code
passive eavesdropper
precoding
pubcrawl
repair efficient distributed storage systems
resilience
Resiliency
Secure storage
secure storage codes
security
telecommunication security
biblio
Polar codes for arbitrary classical-quantum channels and arbitrary cq-MACs
Submitted by grigby1 on Tue, 01/16/2018 - 5:36pm
arbitrary Abelian group operation
arbitrary classical-quantum multiple access channels
arbitrary cq-MAC
Arikan-style transformation
codes
Decoding
deterministic homomorphism channels
Electronic mail
encoding
error statistics
Homomorphic encryption
Human Factors
Metrics
polar codes
polarization theorems
probability of error
pubcrawl
quantum successive cancellation decoder
Random variables
Receivers
Reliability
Resiliency
Scalability
biblio
Backchanneling Quantum Bit (Qubit) 'Shuffling': Quantum Bit (Qubit) 'Shuffling' as Added Security by Slipstreaming Q-Morse
Submitted by grigby1 on Fri, 11/03/2017 - 10:33am
backchanneling quantum bit shuffling
backchanneling qubit shuffling
Backchannelling
backchannelling quantum Morse code
blockchain ledger history
blockchain security
Ciphers
codes
communication security
containment wave
Cypher
digital signature algorithm
DSA
ECDSA
elliptic curve digital signature algorithm
Entanglement
Internet of Things
Morse
predicted-expected sender-receiver properties
pubcrawl
public key cryptography
Quantum bit (Qubit)
quantum computing
quantum cryptography
quantum cyphers
Quantum entanglement
random radicals
Resiliency
Rivest-Shamir-Adleman
RSA
Scalability
sensors
Shuffling
slipstreaming Q-Morse code
biblio
Programmable management framework for evolved SDN
Submitted by BrandonB on Wed, 05/06/2015 - 8:56am
autonomic network management
bottom-up approach
code lifecycle management
codes
computer architecture
control systems
distributed execution environment
evolved SDN
FIPA
Hardware
IP networks
management functions
network management
on-the-fly code update
OSGI
PDEE
programmable management framework
Protocols
SDN
SDN architecture
SDN manager
SDN networks
SDN philosophy
security
Software
software radio
software-defined networking
telecommunication network management
biblio
A Cross-Layer Secure Communication Model Based on Discrete Fractional Fourier Fransform (DFRFT)
Submitted by BrandonB on Tue, 05/05/2015 - 9:21am
codes
Constellation diagram
cross-layer
cross-layer DFRFT security communication model
cross-layer secure communication model
cross-layer strong mobile communication secure model
crosslayer
DFRFT
Discrete Fourier transforms
discrete fractional Fourier fransform
distort signal parameter
distortion
eavesdropper
error-free legitimate channel
flip-flops
Mobile communication
OFDM
physical layer security
secure communication systems
security
security code
security codes
signal processing
signal processing applications
telecommunication security