Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Data Transmission
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 2:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
biblio
A secure data aggregation protocol for fog computing based smart grids
Submitted by aekwall on Mon, 06/24/2019 - 3:00pm
Smart Grid
policy-based governance
privacy
Protocols
pubcrawl
Resiliency
secure data aggregation
Secure Data Aggregation scheme
Security analysis
Servers
performance evaluation results
Smart Grid Consumeer Privacy
smart grid consumer privacy
Smart Grids
smart power grids
storage efficiency
storage overhead
telecommunication security
transmission overhead
edge computing
Cloud Computing
cloud server
computational overhead
Cryptography
data aggregation
data aggregation process
data privacy
Data Transmission
additive homomorphic encryption consumer privacy
end-to-end confidentiality
FCSG
Fog computing
fog layer
Human behavior
Internet of Things
Metrics
novel Domingo-Ferrer additive privacy
biblio
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid
Submitted by grigby1 on Thu, 03/28/2019 - 3:16pm
recursive filters
power engineering computing
power system security
PPTD scheme
privacy
privacy preservation
privacy-preserving energy theft detection scheme
pubcrawl
recursive filter
Metrics
security
Smart Grid
Smart Grid Privacy
Smart Grids
smart meters
smart power grids
state estimation based energy theft detection scheme
abnormal data
Logic gates
Local area networks
information privacy issues
individual households
Human behavior
energy theft behaviors
energy savings
energy consumption
electricity bill payments
Data Transmission
data privacy
Cryptography
composability
attacked meters
abnormal users
biblio
Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System
Submitted by grigby1 on Mon, 01/21/2019 - 12:20pm
eavesdropping
Visible Light Communications Security
visible light communication system
signal to noise ratio threshold
Receivers
receiver aperture
optical wireless interception vulnerability analysis
optical links
modulation
lighting
indoor communication performance
indoor communication
security
Data Transmission
data communication
Apertures
optical communication
light emitting diodes
Signal to noise ratio
telecommunication security
Scalability
Resiliency
Metrics
pubcrawl
biblio
FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light Communications
Submitted by grigby1 on Mon, 11/19/2018 - 12:34pm
Retina
invisible data encoding
Metrics
Mobile handsets
mobile phone screens
novel modulation method
optical modulation
optical transmitters
pubcrawl
Receivers
resilience
Resiliency
Image color analysis
Scalability
Steganography
telecommunication security
time 2.0 d
uniform data
unlicensed bandwidth resources
unobtrusive steganography methods
user distraction
visible light communications
visual MIMO
display screencamera communication
BER
Bit error rate
camera based receiver architectures
Cameras
color shift based methods
data encapsulation
data hiding capability
Data Transmission
Demodulation
demodulation mechanisms
Device-to-device communication
Visible Light Communications Security
display transmitters
error correction codes
error statistics
foveation
foveation based data hiding
FoVLC
free-space optical communication
HAN systems
home area networking system
human visual system
biblio
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Submitted by grigby1 on Wed, 06/20/2018 - 12:27pm
routing discovery phase
Peer-to-peer computing
privacy
privacy-preserving verification
pubcrawl
PVad
resilience
Resiliency
Routing
passive attacks
routing path
routing security
security
security of data
source node
telecommunication network routing
telecommunication security
verification
expected log data
Ad hoc networks
cognition
Compositionality
data privacy
Data Transmission
Diagnostics
distributed cooperation
dynamic topology
active attacks
expected routing paths
MANET
MANETs
Metrics
mobile ad hoc networks
mobile computing
multiple malicious nodes
biblio
A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN
Submitted by grigby1 on Wed, 04/11/2018 - 2:54pm
sensor nodes
resilience
Resiliency
Routing
routing algorithms
Routing protocols
Scalability
secure environmental monitoring system
security
pubcrawl
telecommunication power management
telecommunication security
Time Frequency Analysis
time latency
Wireless communication
wireless sensor area
wireless sensor networks
WSN routing
hybrid routing algorithm
bio inspired algorithms
Channel measurement
Clustering algorithms
cyber physical systems
Data Transmission
environmental monitoring (geophysics)
firefly algorithm
Fireflyalgorithm
Algorithm design and analysis
LAL users
Localizability aided localization routing protocol
metaheuristic hybrid algorithm
Metrics
network lifetime
packet drop
Packet loss
Protocol frequency
biblio
Enhancing data security of iOS client by encryption algorithm
Submitted by K_Hooper on Wed, 02/28/2018 - 11:34am
Human Factors
sensitive data
Resiliency
pubcrawl
mobile devices
Metrics
iOS Security
iOS devices
iOS client
iOS (operating system)
information security
Compositionality
encryption algorithms
EDS
ECC encryption algorithms
ECC
desktop computer
DES encryption algorithm
Data Transmission
Data Security
Cryptography
biblio
"VLSI implementation of BER measurement for wireless communication system"
Submitted by grigby1 on Tue, 02/14/2017 - 12:50pm
forward error correction
wireless communication system
Wireless communication
VLSI implementation
VLSI
Very large scale integration
telecommunication control
symmetric encryption algorithm
Receivers
radio transmitters
radio receivers
pubcrawl170102
MIMO transmitter
MIMO receiver
MIMO communication
forward error correction codes
BER
FEC codes
fading channels
fading channel
error statistics
encryption
Data Transmission
Data Security
data reliability
CSEEC
cryptosystem with embedded error control
Cryptography
Crypto-System
Bit error rate
BER measurement communication system
biblio
"Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 2:13pm
NIOS II soft core processor
Image coding
image compression
image decryption
image encryption
information transmission
internet
MATLAB
microprocessor chips
network security
field programmable gate arrays
pubcrawl170102
QUARTUS II
scrambling plaintext
SOPC builder tool
standards
system-on-chip
system-on-programmable chip builder tool
W7 key stream generator
data compression
Advanced Encryption Standard (AES) Algorithm
AES encryption algorithm
Algorithm design and analysis
Altera DE2 FPGA board
computer network security
confidential image data protection
Cryptography
Cyclone II EP2C35F672
Cyclone II FPGA
advanced encryption standard
data storage
Data Transmission
digital communication network
digital data exchange cryptography
digital world Internet
discrete wavelet transform
DWT
encryption
« first
‹ previous
1
2
3
4
next ›
last »