Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
error correction codes
biblio
The Research on Fingerprint Encryption Algorithm Based on The Error Correcting Code
Submitted by grigby1 on Fri, 03/31/2023 - 11:24am
biometric encryption
pubcrawl
encryption
error correcting code
error correction
error correction codes
fingerprint detail-point
fingerprint encryption
Fingerprint recognition
image matching
Metrics
noise reduction
random key
resilience
Resiliency
Wireless communication
biblio
Deletion Error Correction based on Polar Codes in Skyrmion Racetrack Memory
Submitted by aekwall on Wed, 04/13/2022 - 10:19am
simulation
Conferences
pubcrawl
Scalability
privacy
encoding
parity check codes
Decoding
error correction codes
error correction
deletion error
polar codes
racetrack memory
data deletion
biblio
An Efficient Group Secret Key Generation Scheme for Wireless Sensor Network
Submitted by aekwall on Mon, 01/31/2022 - 4:15pm
simulation
wireless sensor networks
pubcrawl
Metrics
Resiliency
composability
Smart Grids
wireless networks
physical layer security
Mesh networks
wireless mesh networks
code-domain
error correction codes
group secret key generation
information exchanges
biblio
Algebraic Signature Based Data Possession Checking Method with Cloud Storage
Submitted by grigby1 on Wed, 06/30/2021 - 3:27pm
Metrics
the forward error-correcting code
Servers
security
Resiliency
resilience
Reliability
pubcrawl
Protocols
algebraic signature
forward error correction
error correction codes
encoding
data possession checking
composability
cloud storage
Cloud Computing
Cascading style sheets
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
error correction codes
pollution attack
Pollution
network error correction
network coding security
information-theoretic approach
Information rates
cryptographic signature
cryptographic approach
information theoretic security
multicast communication
Upper bound
error correction
network coding
Scalability
computer networks
information security
information theory
Metrics
Cryptography
wireless sensor networks
policy-based governance
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
biblio
PAIR: Pin-aligned In-DRAM ECC architecture using expandability of Reed-Solomon code
Submitted by aekwall on Mon, 03/22/2021 - 1:09pm
In-DRAM ECC
Resiliency
Reliability
Reed-Solomon codes
Reed-Solomon code
pubcrawl
process scaling
pin-aligned In-DRAM ECC architecture
performance degradation
PAIR
numerous inherent faults
In-DRAM Error Correcting Code
Compositionality
expandability
error correction codes
error correction
ECC codewords
DRAM vendors
DRAM chips
DRAM
DQ pin lines
density
computer systems
biblio
Performance Analysis of FSO Systems over Imperfect Málaga Atmospheric Turbulence Channels with Pointing Errors
Submitted by aekwall on Mon, 03/15/2021 - 11:56am
Probability density function
realistic channel model
pointing errors
Monte-Carlo simulations
Málaga turbulence channel
imperfect Málaga atmospheric turbulence channels
imperfect Gamma-Gamma channels
FSO communication systems
ergodic channel capacity expressions
ergodic channel capacity
ECC metrics
composite probability density function
channel estimation errors
average bit error rate
atmospheric turbulence
BER
Resiliency
bit-error-rate
Performance analysis
Channel models
optical links
Channel estimation
Communication Systems
Atmospheric modeling
error correction codes
Monte Carlo methods
error statistics
channel coding
channel capacity
Metrics
composability
pubcrawl
biblio
Simplified Calculation of Bhattacharyya Parameters in Polar Codes
Submitted by aekwall on Mon, 03/15/2021 - 11:55am
error probability
Reliable channel
nonsystematic polar code
N polarizing channels
memoryless systems
K most reliable polarizing channels
complementary channel condition
code construction
channel reliability
calculated complexity
binary erasure channel
Bhattacharyya parameters
Bhattacharyya Parameter method
Bhattacharyya parameter
BEC channel
Maximum likelihood decoding
Resiliency
block codes
telecommunication network reliability
polar codes
error correction codes
encoding
Complexity theory
computational complexity
error statistics
channel coding
channel capacity
Reliability
Metrics
composability
pubcrawl
biblio
Efficient Reed-Muller Implementation for Fuzzy Extractor Schemes
Submitted by aekwall on Mon, 01/18/2021 - 11:34am
medium-range FPGA device
attack models
area constraints
delay constraints
efficient Reed-Muller implementation
fuzzy extraction scheme
fuzzy extractor schemes
fuzzy-extractor
immunity
intrinsic hardware security
Hamming distance
physical tampering
PUF circuits
PUF implementations
Reed-Muller
Reed-Muller codes
Reed-Muller ECC design
responses stability
Fuzzy Cryptography
counterfeiting
FPGA
Scalability
Cryptography
Internet-of-Things
security
Table lookup
Resiliency
pubcrawl
Metrics
field programmable gate arrays
Decoding
fuzzy set theory
security problem
electronic devices
error correction codes
PUF
physical unclonable functions
Distributed Applications
biblio
Improved Veron Identification and Signature Schemes in the Rank Metric
Submitted by grigby1 on Tue, 10/06/2020 - 1:51pm
probability
veron identification
Transforms
smallest signature
signature size
Security Metrics
secure signature scheme
rank metric
random oracle model
quantum cryptography
quantum computing
public key size
public key cryptography
pubcrawl
Protocols
cheating probability
Metrics
Measurement
linear codes
identification protocol
Fiat-Shamir transform
error-correcting codes
error correction codes
double circulant codes
digital signatures
Decoding
Cryptography
Computing Theory
code-based signature schemes
1
2
3
4
5
next ›
last »