Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Receivers
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
image colour analysis
text-to-image encryption algorithms
Text-to-Image Encryption
survey
RSA and AES
RGB Value
RGB color value
keeping data
global network
data encryption techniques
Comparison
Asymmetric Encryption
symmetric encryption algorithms
asymmetric encryption algorithms
sensitive data
Cryptography
Software algorithms
public key cryptography
Public key
Image color analysis
text analysis
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
Receivers
encryption
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
different ECUs
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
improved security
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
Metrics
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
road safety
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
biblio
A New Side-Channel Vulnerability on Modern Computers by Exploiting Electromagnetic Emanations from the Power Management Unit
Submitted by grigby1 on Mon, 01/25/2021 - 11:30am
power consumption
Voltage regulators
voltage regulator module
Voltage control
Switches
side-channel vulnerability
side-channel
security of data
Resiliency
resilience
Regulators
Receivers
pubcrawl
power system management
Power Management.
power management unit
Air gaps
Phasor measurement units
modern microprocessors
modern computers
microprocessor chips
Microarchitecture Vulnerability
microarchitectural vulnerability
Metrics
Human Factors
Human behavior
electromagnetic-based side-channel
electromagnetic emanations
DVFS
computer power supplies
composability
Capacitors
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
internet
Transmitters
time series
telecommunication channels
Receivers
public communication channel
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
Lyapunov-based adaptive technique
Lyapunov methods
chaotic cryptography
Encryption technique
Cryptography
crypto-analysis methods
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
pubcrawl
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
military radio
wireless mobile communication
voice encryption
voice data security
voice communication
trunked radio
telecommunication technology
telecommunication security
security systems
Receivers
multiple circular chaotic permutation
multiple circular
multicircular permutations
chaotic cryptography
GSM network
GSM
Global System for Mobile
end-to-end voice encryption
encryption
dynamic keys
Cryptography
chaotic communication
chaotic algorithm
cellular technologies
cellular radio
pubcrawl
biblio
Fuzzy Elliptic Curve Cryptography based Cipher Text Policy Attribute based Encryption for Cloud Security
Submitted by aekwall on Mon, 01/18/2021 - 11:24am
data confidentiality
Receivers
public key encryption
public key cryptography
fuzzy set theory
fuzzy fined-grained access control
fuzzy elliptic curve cryptography
Fuzzy Cryptography
Fuzzy
encryption
efficient encryption
Diffie Hellman
data transfer
Data Security
data privacy
Elliptic curve cryptography
data access control scheme
cyber physical systems
composability
Cloud Security
Cloud Computing
cipher text policy attribute based encryption
authorisation
Attribute authority
access control mechanisms
Access Control
Metrics
Resiliency
Scalability
pubcrawl
biblio
Adaptive filtering of non-fluctuation interference when receiving signals with multi-position phase shift keying
Submitted by grigby1 on Mon, 12/28/2020 - 12:47pm
non-fluctuation interference
weighting coefficients
signal with multi-position phase shift keying
Signal to noise ratio
Scalability
Resiliency
resilience
recursive filters
receiving signals
Receivers
quadrature coherent signal receiver
pubcrawl
Power harmonic filters
Phase shift keying
optimal filter parameters
nonfluctuation interference
adaptation coefficient
noise immunity
multiposition phase shift keying
Metrics
interference (signal)
Interference
harmonic interference
Harmonic analysis
filtering theory
constant envelope
Bit error rate
adjustment algorithm
adaptive nonrecursive filter
adaptive filters
adaptive filtering
adaptive filter
biblio
Effects of Man in the Middle (MITM) Attack on Bit Error Rate of Bluetooth System
Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
MITM Attack
communication path
Demodulation
frequency 0.006 Hz
frequency shift keying
Gaussian Frequency Shift Keying
Gaussian frequency shift keying modulation
GFSK demodulation
hopping rate
man in the middle attack
communicating devices
radio links
radio receivers
radio transmitters
radiofrequency links
radiofrequency waves
software model
time 150.0 s
unauthorized transmitter
White noise
error statistics
pubcrawl
Human behavior
resilience
Resiliency
computer network security
composability
Ad hoc networks
Receivers
Ad-Hoc Network
Bluetooth
Telecommunications
Bit error rate
man-in-the-middle attack
Gaussian noise
Frequency modulation
advanced white Gaussian noise channel
bit error rate measurements
bluetooth security
Bluetooth system
biblio
The Effect of Acoustic-Shell Coupling on Near-End Self-Interference Signal of In-Band Full-Duplex Underwater Acoustic Communication Modem
Submitted by aekwall on Mon, 12/21/2020 - 1:30pm
modems
Scattering
acoustic scattering component
acoustic wave interference
acoustic-shell coupling effect
IBFD UWA communication modem
in-band full-duplex
in-band full-duplex underwater acoustic communication modem technology
interference suppression
OFDM
near-end self-interference signal
self-interference cancellation
SI channel
SI signal reconstruction
underwater acoustic communication modem
underwater acoustic sensor networks
UWA communication modem shell
Scalability
Channel estimation
Underwater acoustics
channel impulse response
underwater acoustic communication
UWSN
self-interference
radiofrequency interference
Interference cancellation
acoustic coupling
wireless channels
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Receivers
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »