Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
An Encryption and Decryption Algorithm Based on Random Dynamic Hash and Bits Scrambling
Submitted by aekwall on Mon, 03/29/2021 - 11:06am
Filling
stream cipher algorithm
stream cipher
Resiliency
Random Dynamic Hash
pubcrawl
Lenses
Heuristic algorithms
hash mapping address
Hash functions
hash algorithms
binary random dynamic hash
Europe
encryption method
encryption
decryption methods
Cryptography
Compositionality
ciphertext space
Ciphers
bits scrambling
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
least significant bit
weak security
unsecured operating systems
uncompensatory loss
tampering counterfeiting
suboptimal multimedia applications
Steganography
Smart Systems
Signal processing algorithms
Scalability
Resiliency
Receivers
public key cryptography
pubcrawl
Metrics
LSB watermarking
banking applications
information security
information cloning
image watermarking
image enhancement
Hill cipher algorithm
Hill Cipher
Elliptic curve cryptography
ECC algorithm
discrete cosine transforms
discrete cosine transform
DCT coefficients
Data Security
Cryptography
Ciphertext
Ciphers
biblio
A Reversible Meaningful Image Encryption Scheme Based on Block Compressive Sensing
Submitted by aekwall on Mon, 02/15/2021 - 3:48pm
encryption
secret image
reversible meaningful image encryption scheme
Resiliency
pubcrawl
plain image
meaningful image encryption
Logistics
least significant bit embedding
Image reconstruction
image compression
Image coding
final meaningful cipher image
ABCS
efficient image encryption scheme
efficient encryption
efficiency performance
cyber physical systems
Cryptography
Correlation
compressed sensing
composability
Ciphers
carrier image
Adaptive Block Compressive Sensing framework
adaptive block compressive sensing
biblio
Medical Image Compression and Encryption using Chaos based DNA Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 12:51pm
encryption
Resiliency
Human behavior
pubcrawl
privacy
DNA
Image coding
Ciphers
Predictive Metrics
Transforms
Biomedical imaging
DNA cryptography
discrete wavelet transforms
Discrete Haar Wavelet Transform
lossless compression
medical image encryption
biblio
Application of Homomorphic Encryption in Machine Learning
Submitted by aekwall on Mon, 02/01/2021 - 10:35am
Scalability
encryption
machine learning algorithms
Resiliency
pubcrawl
Cryptography
Metrics
Prediction algorithms
machine learning
Human Factors
Ciphers
Homomorphic encryption
linear regression
biblio
Implementing Asymmetric Cryptography in High-Speed Data Transmission over Power Line
Submitted by aekwall on Mon, 01/25/2021 - 11:59am
password
High-speed
corporate network
Asymmetric Encryption
elliptic curve
Ciphers
PLC
Elliptic curves
Public key
Servers
Metrics
Cryptography
composability
pubcrawl
Human behavior
Resiliency
Protocols
encryption
biblio
Secure Mobile Sensor Data Transfer using Asymmetric Cryptography Algorithms
Submitted by aekwall on Mon, 01/25/2021 - 11:58am
encryption
smart devices
secure data transfer
Resiliency
pubcrawl
Mobile Sensor Data Security
Metrics
Meters
Human behavior
sensor security
Elliptic curve cryptography
Databases
Cryptography
composability
Cloud Computing
Ciphers
Asymmetric Encryption
asymmetric algorithms
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
encryption
traditional cryptography algorithms
symmetric encryption
symmetric cipher
stream cipher
Salsa20
pseudorandom keys
NIST suite
NIST
lightweight cryptography
information technology
Information systems
hybrid modified lightweight algorithm
generated sequence keys
chaotic cryptography
data communication
cryptography algorithms PRESENT
Cryptography
Constrained Devices
computational complexity
Classification algorithms
Ciphers
cipher algorithm
chaotic system
chaotic communication
block ciphers
2D logistic map
pubcrawl
biblio
Computational Analysis of Security Algorithm on 6LowPSec
Submitted by aekwall on Mon, 12/21/2020 - 12:26pm
radio links
IPv6 communication process
light weight IPSec
light weight variant
lightweight-based security need
message authentication
Peer-to-peer computing
personal area networks
pubcrawl
IP networks
Routing
Routing protocols
security
security Algorithm
security approach
security solutions
telecommunication security
word length 128.0 bit
AES
Resiliency
composability
Metrics
policy-based governance
6LoWPAN
6LoWPAN IoT environment
6LoWPAN radio link
6LowPSec protocol
ipv6 security
Ciphers
computer network security
Cryptographic Protocols
existing security protocol IPSec solutions
internet
Internet of Things
IoT
biblio
Comparative Analysis of Encryption and Decryption Techniques Using Mersenne Prime Numbers and Phony Modulus to Avoid Factorization Attack of RSA
Submitted by aekwall on Mon, 09/21/2020 - 2:47pm
Dual RSA
confinement
Wiener'
Trial Division
s Factorization
s attack
Rivest Shamir and Adleman algorithm
Public Key cryptographic algorithm
phony modulus
online Security
Mersenne prime numbers
Mersenne Prime
Fermat'
factorization attack
encryption
decryption techniques
public-key cryptography
RSA algorithm
Ciphers
public key cryptography
cyber-physical systems
encryption techniques
privacy
Mathematical model
composability
pubcrawl
Resiliency
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »