2018 MILCOM
Tweet
Sessions
Speakers
Exhibitors
Press Releases
Floor Plan
Buzz
Technical Paper Session: CSTC-6: Data Security Research
(
Room
New Orleans
)
31 Oct 18
9:40 AM
-
12:00 PM
Tracks:
Track 3: Cyber Security and Trusted Computing, Unclassified Technical Paper Sessions
Runtime State Verification on Resource-Constrained Platforms
John Clemens
(Johns Hopkins University Applied Physics Lab, USA);
Raj Pal
(Department of Defense, USA);
Branden Sherrell
(Johns Hopkins University Applied Physics Lab, USA)
Sharing Susceptible Passwords as Cyber Threat Intelligence Feed
Iman Vakilinia
,
Sui Cheung
and
Shamik Sengupta
(University of Nevada, Reno, USA)
Secure Proxy-Reencryption-based Inter-network Key Exchange
Lloyd Greenwald
(LGS Innovations, USA);
Kurt Rohloff
(New Jersey Institute of Technology & NJIT, USA);
David Stott
(MIT Lincoln Labs, USA)
15-min session break
An Empirical Upper Bound on Secrecy Capacity of Multipath Fading Channels
Sima Azizi
(Southern Illinois University, USA);
Arash Komaee
(Southern Illinois University & Southern Illinois University, USA)
Secrecy Performance of a Relaying System over Non-identical Fading Channels
Xian Liu
(University of Arkansas at Little Rock, USA)
Home
Sessions
Speakers
Exhibitors
Press Releases
Floor Plan
Tweet
Login
|
Back to top
ChirpE