Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure communication
biblio
The Technology and System of Chaotic Laser AVSK Coding and Combined Coding for Optics Secure Communications
Submitted by grigby1 on Fri, 04/14/2023 - 4:02pm
chaos
laser
AVSK
Optics
Resiliency
chaotic cryptography
Space vehicles
secure communication
Trajectory
pubcrawl
Decoding
real-time systems
encoding
chaotic communication
Scalability
resilience
Metrics
biblio
Implementation of Chaotic Encryption Architecture on FPGA for On-Chip Secure Communication
Submitted by grigby1 on Fri, 04/14/2023 - 4:01pm
secure communication
Xilinx System Generator
wearables
SprottD
Lorenz
edge-compute devices
Chua’s Chaotic equations
Chaos implantation
CMOS
Resiliency
wearable computers
chaotic cryptography
Hardware Security
computer architecture
Internet of Things (IoT)
chaotic communication
Scalability
system-on-chip
Hardware
FPGA
resilience
Metrics
pubcrawl
security
encryption
biblio
An Authenticated Key Agreement Scheme for Secure Communication in Smart Grid
Submitted by grigby1 on Fri, 07/29/2022 - 9:04am
Smart Grid
power grid vulnerability analysis
session key
trusted authority
key agreement
secure communication
Metrics
Smart Grids
Wireless communication
smart meters
tools
Protocols
authentication
Scalability
Resiliency
resilience
pubcrawl
security
privacy
biblio
Cognitive Radio Primary Network Secure Communication Strategy Based on Energy Harvesting and Destination Assistance
Submitted by grigby1 on Fri, 07/01/2022 - 10:21am
radio transmitters
spectral efficiency
Destination assistance
Cognitive Radio (CR)
beamforming
Artificial noise jamming signal
array signal processing
secure communication
Resiliency
pubcrawl
Cognitive Radio Security
physical layer security
cognitive radio
energy harvesting
simulation
Receivers
resilience
biblio
Chaos-based Cryptography Using an Underactuated Synchronizer
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
pubcrawl
Conferences
composability
chaotic communication
Compositionality
chaos
Synchronization
encryption
Sensitivity
Communications technology
Costs
Industry applications
Liu system
Lyapunov analysis
secure communication
theoretical cryptography
biblio
Blockchain Based Mutual Authentication for VoIP Applications with Biometric Signatures
Submitted by grigby1 on Tue, 04/19/2022 - 1:14pm
authentication
Biological system modeling
biometrics (access control)
blockchain
blockchains
Elliptic curve cryptography
encryption
P2P network
privacy
pubcrawl
resilience
Resiliency
Scalability
secure communication
signature based defense
VoIP
biblio
Securing Smart Grid Communication Using Ethereum Smart Contracts
Submitted by grigby1 on Tue, 11/30/2021 - 3:04pm
blockchain
Companies
computer architecture
contracts
ethereum
IoT
Metrics
pubcrawl
resilience
Resiliency
Scalability
secure communication
Smart Grid
Smart Grids
smart grid security
smart meters
biblio
Role of Ubiquitous Computing and Mobile WSN Technologies and Implementation
Submitted by aekwall on Wed, 07/07/2021 - 4:46pm
secure communication
Resiliency
Metrics
Scalability
pubcrawl
Ubiquitous Computing Security
ubiquitous computing
Smart Home
Smart City
security
Mobile wireless sensor networks
mobile ad hoc networks
military computing
Games
data privacy
wireless sensor networks
Human Factors
Monitoring
biblio
The Million Dollar Handshake: Secure and Attested Communications in the Cloud
Submitted by grigby1 on Wed, 05/05/2021 - 12:58pm
Remote Attestation
Virtual machining
standards
Software
secure enclaves
secure communication
Scalability
sandboxing
rendering (computer graphics)
attestation
pubcrawl
Protocols
policy-based governance
composability
Communication channels
collaboration agreements
collaboration
Cloud Computing
biblio
Minimal Information Exchange for Secure Image Hash-Based Geometric Transformations Estimation
Submitted by grigby1 on Thu, 04/08/2021 - 5:13pm
phase encoding framework
decoder estimate
distributed source coding
distributed source coding perspective
Fourier-Mellin transform
hash security
image hashing
minimal hash size
minimal information exchange
central server
Phase spectrum
reference image
rigid image registration
rigid image registration technique
secure image hash-based geometric transformations estimation
signal processing applications
transformation parameters
computational complexity
information security
pubcrawl
Human behavior
Metrics
resilience
Resiliency
Scalability
Bandwidth
Cryptography
Forensics
image registration
source coding
information forensics
Image coding
secure communication
secure transmission
1
2
3
4
5
next ›
last »