Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphers
biblio
Speech encryption based on the synchronization of fractional-order chaotic maps
Submitted by aekwall on Tue, 09/08/2020 - 9:13am
chaotic cryptography
speech encryption
speech communication
key generation mechanism
input speech signal
Fractional-order chaotic systems
fractional-order chaotic map
exact synchronization
encryption system
encryption function
encrypting decrypting speech
Deadbeat observer
chaotic key matrix
chaotic key generator
speech processing
Chaotic systems
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Ciphers
Correlation
Robustness
matrix algebra
Synchronization
synchronisation
composability
pubcrawl
Resiliency
encryption
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
Security Analysis of Improved One-Time Pad Cryptography Using TRNG Key Generator
Submitted by grigby1 on Fri, 09/04/2020 - 2:38pm
frequency monobit
brute force attacks
TRNG key generator
trng
ryptography
Refining
random keys
PRNG
Prediction algorithms
OTP
one-time pad cryptography
one-time pad
information security analysis
Ciphers
Fisher-Yates shuffling algorithm
cipher text mapping
avalanche effect
random number generation
Brute Force Attack
policy-based governance
Human Factors
cryptographic algorithms
pubcrawl
Generators
encryption
Cryptography
biblio
High Speed Parallel RC4 Key Searching Brute Force Attack Based on FPGA
Submitted by grigby1 on Fri, 09/04/2020 - 2:36pm
Hardware
Xilinx XC3S1600E-4 FPGA device
stream cipher
RC4 algorithm
RC4
random-access storage
pubcrawl
process control
policy-based governance
on-chip BRAM
main controller
key searching unit
key searching speed
Human Factors
High Speed Parallel RC4 Key Searching Brute Force Attack
block RAM
frequency 128 MHz
FPGA
forecast keying methods
Force
field programmable gate arrays
field programmable gate array
encryption
Cryptography
Clocks
clock rate
Ciphers
brute force attacks
Brute force
biblio
Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
policy-based governance
brute force attacks
plaintext
key space
information theory
cryptosystem key
cryptographer
Crypto-System
Brute Force Attack
game theory
Ciphers
Ciphertext
Human Factors
Games
collaboration
pubcrawl
Security Evaluation
Mathematical model
Cryptography
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 2:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
Self-Adaptation Applied to MQTT via a Generic Autonomic Management Framework
Submitted by aekwall on Mon, 08/24/2020 - 11:47am
Ciphers
Autonomic Security
security process
production equipment
product customisation
MQTT infrastructure
manufacturing enterprises
industry 4.0 environments
generic autonomic management framework
data transmission flexibility
customized production processes
anomaly detection methods
security of data
data communication
quality of service
Anomaly Detection
business process
production engineering computing
Industries
composability
pubcrawl
Resiliency
Servers
biblio
Using Attribute-Based Encryption on IoT Devices with instant Key Revocation
Submitted by aekwall on Mon, 08/17/2020 - 10:42am
pubcrawl
sensor readings
sensor devices
resource constraint devices
Identity-based encryption
cryptographic cipher-texts
ABE cipher-texts
IoT services
Ciphers
Data protection
policy-based governance
Scalability
Human behavior
data encryption
IoT devices
Internet of Things
Conferences
attribute-based encryption
data privacy
encryption
Cryptography
authorisation
biblio
Comparing Performances of Cypress Block Cipher and Modern Lighweight Block Ciphers on Different Platforms
Submitted by aekwall on Mon, 08/10/2020 - 9:32am
Cypress-256
Windows x32
Scalability
Resiliency
pubcrawl
Microsoft Windows (operating systems)
Metrics
Linux
lighweight block ciphers
lightweight cryptography
Humanoid robots
Human behavior
encryption speed
encryption
composability
Cypress block cipher
Cryptography
computer architecture
Ciphers
block cipher Cypress
Androids
android encryption
Android (operating system)
android
64-bit Linux
Linux Operating System Security
Predictive Metrics
« first
‹ previous
…
4
5
6
7
8
9
10
11
12
…
next ›
last »