Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks.
Dong-Hoon ShinJinkyu KooLei YangXiaojun LinSaurabh BagchiJunshan ZhangPublished in: CNS (2013)
Keyphrases
- low complexity
- cryptographic protocols
- security protocols
- computational complexity
- cyber physical systems
- motion estimation
- security mechanisms
- cyber physical
- peer to peer
- network management
- multiple description coding
- distributed video coding
- network structure
- network traffic
- real time
- physical world
- security issues
- image sequences
- three dimensional