Information security protocol based system identification with binary-valued observations
From MaRDI portal
Publication:1621182
DOI10.1007/S11424-017-7075-7zbMATH Open1443.94083OpenAlexW2644864076MaRDI QIDQ1621182FDOQ1621182
Authors: Changbao Xu, Yanlong Zhao, Jifeng Zhang
Publication date: 8 November 2018
Published in: Journal of Systems Science and Complexity (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11424-017-7075-7
Recommendations
- Parameter estimation in systems with binary-valued observations and structural uncertainties
- Theoretical aspects of information security
- Secrecy Systems for Identification Via Channels with Additive-Like Instantaneous Block Encipherer
- Distributed system identification for linear stochastic systems with binary sensors
- New algorithms and protocols for information authentication in automatic control systems
information securitycryptographypassive attackstime complexitysecurity protocolidentification algorithm
Cites Work
- Fully homomorphic encryption using ideal lattices
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Distributed Consensus With Limited Communication Data Rate
- Player simulation and general adversary structures in perfect multiparty computation
- Optimal military spending, trade and stochastic economic growth
- A multi-channel transmission schedule for remote state estimation under DoS attacks
Cited In (3)
- Research on image signal identification based on adaptive array stochastic resonance
- Identification of FIR systems with binary-valued observations against denial-of-service attacks
- System identification with binary-valued observations under both denial-of-service attacks and data tampering attacks: the optimality of attack strategy
This page was built for publication: Information security protocol based system identification with binary-valued observations
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1621182)