Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
information theory
biblio
Universal Hashing for Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:43pm
Scalability
private key cryptography
Receivers
security
Resiliency
Human behavior
pubcrawl
policy-based governance
Communication system security
Cryptography
Metrics
information theory
information-theoretic security
Physical layer
Noise measurement
encoding
Communication channels
information theoretic security
secret key agreement
Random variables
telecommunication services
2-universal hash family
information coding
modular coding schemes
wiretap codes
wiretap coding
biblio
Dynamic information-theoretic measures for security informatics
Submitted by aekwall on Thu, 04/08/2021 - 4:42pm
Scalability
Cryptography
malware
invasive software
cyber security
Resiliency
Human behavior
pubcrawl
policy-based governance
Social network services
social networking (online)
Metrics
social network
natural language processing
information theory
Markov processes
static analysis
Informatics
security domain
vehicle dynamics
information theoretic security
activity trace
behavior prediction
dynamic information-theoretic measure
dynamical process analysis
innocent computer network activity
instruction sequence
legitimate software
malicious computer network activity
Predictive Analytics
security application
Security informatics
social network dynamics
stochastic dynamical system
biblio
Information-spectrum methods for information-theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:41pm
channel state information
complex communication scenarios
Cryptography
ergodic fading channels
Fading
fading channels
feedback
Human behavior
Information analysis
information security
information theoretic security
information theory
information-spectrum methods
information-theoretic security
Interference
Jamming
Metrics
Mutual information
policy-based governance
pubcrawl
Random variables
Resiliency
Scalability
secrecy capacity
secure rates
telecommunication security
wiretap channels
biblio
On combining information-theoretic and cryptographic approaches to network coding security against the pollution attack
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
Scalability
telecommunication security
Cryptographic Protocols
Resiliency
Human behavior
pubcrawl
policy-based governance
wireless sensor networks
Cryptography
Metrics
information theory
information security
computer networks
error correction codes
network coding
error correction
Upper bound
multicast communication
information theoretic security
cryptographic approach
cryptographic signature
Information rates
information-theoretic approach
network coding security
network error correction
Pollution
pollution attack
biblio
On measures of information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:40pm
Scalability
Cryptography
Resiliency
Human behavior
pubcrawl
policy-based governance
Metrics
Entropy
information theory
computational security
probability
Australia
Vectors
information theoretic security
ideal secrecy
information theoretic cryptosystem
Shannon perfect secrecy
biblio
Cryptography with information theoretic security
Submitted by aekwall on Thu, 04/08/2021 - 4:39pm
Scalability
Cryptography
Protocols
Resiliency
Human behavior
pubcrawl
policy-based governance
Metrics
information theory
quantum computing
information security
digital signatures
cryptosystems
Computer graphics
information theoretic security
long-term security
power system security
trusted initializer model
unconditionally secure schemes
biblio
Artificial-Noise-Aided Message Authentication Codes With Information-Theoretic Security
Submitted by aekwall on Thu, 04/08/2021 - 4:38pm
Scalability
Cryptography
Receivers
Resiliency
Human behavior
pubcrawl
policy-based governance
Metrics
authentication
information theory
message authentication
channel coding
information-theoretic security
Physical layer
Transmitters
key recovery attack
Performance Metrics
cryptographic primitive
ANA-MAC
artificial-noise-aided message authentication codes
channel coding and decoding
completeness error
complexity-theoretic MAC
conditional equivocation
false acceptance probability
Information-theoretic authentication codes
message authentication codes
packet-based transmission
quantization
Rijndael cipher
standard authentication tags generation
information theoretic security
biblio
Orthogonal STBC Set Building and Physical Layer Security Application
Submitted by grigby1 on Tue, 12/15/2020 - 1:26pm
pubcrawl
Metrics
resilience
Resiliency
telecommunication security
security
Cryptography
Wireless communication
network security
Buildings
Compositionality
Signal processing algorithms
Monte Carlo methods
Decoding
error statistics
information theory
Physical layer
Bit error rate
transmitting antennas
coding theory
Transforms
communication complexity
BER
brute force decoding complexity
communications link
complex orthogonal space-time block code
encodes data symbols
Monte Carlo simulations
orthogonal codes
orthogonal STBC matrix
orthogonal STBC set building
physical layer security application
physical layer security.
PLS
space-time block code
space-time block codes
transformation algorithms
biblio
PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously
Submitted by grigby1 on Tue, 12/15/2020 - 1:25pm
Cryptography
security of data
pubcrawl
Metrics
resilience
Resiliency
security
Protocols
polynomials
Compositionality
linear codes
information theory
storage efficiency
blockchain system
coding theory
blockchain designs
coded sharding
coded storage protocol
decentralization scalability
information-theoretic upper bounds
linearly scaling efficiency
node subsets
performance scalability
polynomially coded sharding
PolyShard
security scalability
sharding proposals
system throughput
truly scalable system
trust-corrupting
biblio
Modeling and analyzing privacy-awareness social behavior network
Submitted by aekwall on Mon, 09/28/2020 - 11:54am
Scalability
data privacy
Conferences
security
Resiliency
Human behavior
pubcrawl
privacy
Social network services
Computational modeling
social networking (online)
social network
complex networks
information theory
privacy protection
Sensitivity
Social Behavior
behavioural sciences computing
privacy awareness
decision process
driving force
Habitual privacy
highly dynamical network behaviors
network evolutions
networked human society
privacy disclosure behavior
privacy driven model
social behavior network
Computing Theory and Privacy
1
2
3
4
next ›
last »