Supplemental Material
Available for Download
- D. Bakken, et al, "Smart Generation and Transmission with Coherent, Real-Time Data," IEEE Smart Grids special issue, 2011. (pre-print).Google Scholar
- A. Michaels, "A Maximal Entropy Digital Chaotic Circuit," IEEE Int. Symp. on Circuits and Systems (ISCAS), pp. 717-720, May 2011.Google Scholar
- T. Li, et al. "Physical-layer built-in security analysis and enhancement of CDMA systems," MILCOM 2005, pp. 956-962.Google Scholar
- Q. Ling, T. Li, and J. Ren, "Physical-layer built-in security enhancement of DS-CDMA systems using secure block interleaving," Asilomar 2004, pp. 1104-1109.Google Scholar
- A. Ahmad, A. Biri., and H. Afifi, "Study of a new physical layer encryption concept," Mobile Adhoc and Sensor Systems 2008, pp. 860-865.Google Scholar
- A. Zuquete and J. Barros, "Physical layer encryption with stream ciphers," Int. Symp. on Info Theory 2008, pp. 106-110.Google Scholar
- A. Michaels and D. Chester, "Efficient and Flexible Chaotic Communication Waveform Family," MILCOM 2010, pp. 353-358.Google Scholar
- A. Michaels and D. Chester, "Featureless Spread Spectrum Modulation of Arbitrary Data Constellations," IEEE SPAWC 2011, pp. 36-40.Google Scholar
- Harris Corporation, "A closed Galois Field (GF) cryptographic system," pending U.S. patent GCSD-2021.Google Scholar
- J. Allen, et al, "Preventing Cascading Event: A Distributed Cyber-Physical Approach," CSIIRW 2011. (pending). Google ScholarDigital Library
- Committee on National Security Systems, CNSS Instruction No. 4009: National Information Assurance (IA) Glossary, 26 Apr 2010.Google Scholar
Recommendations
Improved convertible authenticated encryption scheme with provable security
Convertible authenticated encryption (CAE) schemes allow a signer to produce an authenticated ciphertext such that only a designated recipient can decrypt it and verify the recovered signature. The conversion property further enables the designated ...
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems
ICDCSW '08: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems WorkshopsDue to the unique characteristics of Cyber-Physical Systems (CPS) such as interaction with the physical world, many new research challenges arise. Many CPS applications will be implemented on computing devices using mobile ad hoc networks (MANETs). ...
Enhanced Certificate-Based Encryption from pairings
In Certificate-Based Encryption, introduced by Gentry, a certificate, -or, more generally, a signature-acts not only as a certificate but also as a decryption key. However, the security model of Gentry's scheme relies on an unrealistic assumption, where ...
Comments