Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
Human behavior
triangular scrambling method
triangular scrambling
transmitted image
transmission channel
subkeys
Resiliency
pubcrawl
privacy
Metrics
man in the middle attack
image encryption
Image coding
hybrid encryption image mechanism
chaos
encryption
eavesdropping attack
DNA sequences
DNA encoding
DNA cryptography
DNA
Cryptography
Correlation
computer science
color image encryption
Ciphers
Chaotic maps
biblio
An enhanced cryptographic model based on DNA approach
Submitted by grigby1 on Tue, 01/23/2018 - 1:53pm
Asymmetric Encryption
authenticity
Ciphers
confidentiality
Cryptography
data communication
decryption
DNA
DNA computing
DNA cryptography
encryption
Human behavior
Metrics
privacy
pubcrawl
Resiliency
biblio
Automated DNA encryption algorithm based on UNICODE and colors
Submitted by grigby1 on Tue, 01/23/2018 - 1:53pm
encoding
UNICODE encoding
Rule 51
RGB color model
Resiliency
pubcrawl
privacy
Metrics
Image color analysis
Human behavior
encryption
automata
DNA encryption algorithm
DNA cryptography based encryption algorithm
DNA cryptography
DNA cryptographic principles
DNA
Cryptography
Ciphers
cellular automata
biocomputing
biblio
An encryption based on DNA cryptography and steganography
Submitted by grigby1 on Tue, 01/23/2018 - 1:53pm
encoding
Resiliency
pubcrawl
privacy
Metrics
Human behavior
Encryption and Decryption
encryption
Encoding and Decoding
AES
DNA Steganography
DNA cryptography
DNA
Data Security
data hiding
Ciphers
Amino acids
biblio
Research on the design and implementation of two dimensional hyper chaotic sequence cipher algorithm
Submitted by grigby1 on Wed, 12/27/2017 - 12:08pm
Algorithm design and analysis
Builder FPGA
chaotic communication
chaotic cryptography
Chaotic sequence generator
Ciphers
component
composability
encryption
Entropy
Metrics
pubcrawl
Resiliency
Science of Security
Sequence cipher
Two dimensional hyper chaos
biblio
Comparative study of two pseudo chaotic number generators for securing the IoT
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
pubcrawl
NIST
nonlinear functions
nonlinear recursive filters
PCNG2
piece-wise linear chaotic map
piecewise linear techniques
PRNGs
pseudo chaotic number generators
network security applications
PWLCmap
random number generation
recursive filters
Resiliency
second pseudo chaotic number generator
Skew Tent map
STmap
generation time
Bit rate
chaotic communication
chaotic cryptography
Ciphers
composability
coupled chaotic maps
cryptographically strong pseudo random number generators
Cryptography
binary diffusion matrix
Generators
Informatics
information security
Internet of Things
IoT
logistic map
Metrics
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator
biblio
A new hybrid encryption technique permuting text and image based on hyperchaotic system
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
HyprChaos
text encryption
Text
Software algorithms
Resiliency
pubcrawl
Niobium
Metrics
Image Processing
image encryption
image
chaos
hyperchaotic system
hybrid encryption technique
hybrid
Generators
encryption algorithms
encryption
Cryptography
composability
Ciphers
chaotic cryptography
biblio
Merkle-Hellman knapsack-side channel monitoring based secure scheme for detecting provenance forgery and selfish nodes in wireless sensor networks
Submitted by grigby1 on Tue, 12/12/2017 - 12:27pm
Metrics
Watchdog
side channel monitoring
Selfish nodes
Resiliency
Public key
pubcrawl
Provenance forgery
Provenance
Monitoring
Bloom filter
Merkle-Hellman knapsack algorithm
Human Factors
Human behavior
encryption
encoding
Compositionality
composability
Ciphers
biblio
Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography
Submitted by grigby1 on Tue, 12/12/2017 - 12:25pm
law enforcement
telecommunication traffic
telecommunication network routing
streaming design
source anonymity
Secure Processing
Scalability
Resiliency
public key cryptography
pubcrawl
Protocols
Peer-to-peer computing
Metrics
Light-weight
anonymous data sharing
Internet traffic
internet
Information Leakage
encryption
encrypted search capabilities
Elliptic curve cryptography
destination anonymity
data sharing
computer network security
circuit creation
Ciphers
anonymous routing
« first
‹ previous
…
10
11
12
13
14
15
16
17
18
next ›
last »