2018 MILCOM

Technical Paper Session: CSTC-6: Data Security Research (Room New Orleans)

31 Oct 18
9:40 AM - 12:00 PM

Tracks: Track 3: Cyber Security and Trusted Computing, Unclassified Technical Paper Sessions

Runtime State Verification on Resource-Constrained Platforms
John Clemens (Johns Hopkins University Applied Physics Lab, USA); Raj Pal (Department of Defense, USA); Branden Sherrell (Johns Hopkins University Applied Physics Lab, USA)
Sharing Susceptible Passwords as Cyber Threat Intelligence Feed
Iman VakiliniaSui Cheung and Shamik Sengupta (University of Nevada, Reno, USA)
Secure Proxy-Reencryption-based Inter-network Key Exchange
Lloyd Greenwald (LGS Innovations, USA); Kurt Rohloff (New Jersey Institute of Technology & NJIT, USA); David Stott (MIT Lincoln Labs, USA)
15-min session break
An Empirical Upper Bound on Secrecy Capacity of Multipath Fading Channels
Sima Azizi (Southern Illinois University, USA); Arash Komaee (Southern Illinois University & Southern Illinois University, USA)
Secrecy Performance of a Relaying System over Non-identical Fading Channels
Xian Liu (University of Arkansas at Little Rock, USA)