Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
confidential data
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
A Novel Steganography Algorithm using Edge Detection and MPC Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 1:04pm
LSB algorithm
trees (mathematics)
stego image
steganography techniques
steganography algorithm
Steganography
sharp edges
security
Scalability
Resiliency
pubcrawl
PSNR
MPC algorithm
MPC
Metrics
composability
LSB
internet
Image coding
full tree
edge detection scheme
edge detection
edge blocks
digital images
data embedding process
data concealment
cover image
corner pixels
confidential data
biblio
A Novel Encryption Algorithm based on DNA Cryptography
Submitted by aekwall on Mon, 06/22/2020 - 11:27am
encoding
plain-text
DNA symmetric cryptography
DNA computing
biocomputing
DNA cryptography
confidential data
encryption algorithm
cryptographic algorithm
encryption process
Cryptography
Predictive Metrics
Ciphers
DNA
privacy
pubcrawl
Human behavior
Resiliency
information security
encryption
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures
biblio
An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack
Submitted by grigby1 on Thu, 06/07/2018 - 3:13pm
SQL injection attack
pubcrawl
receiver operating characteristic curve
Resiliency
ROC curve
secure backend storage
security
security of data
smart devices
SQL
SQL injection
privacy
SQLIA
SQLIA big data
SQLIA Data analytics
SQLIA hashing
SQLIA Pattern-driven data set
Structured Query Language
structured query language injection attack
supervised learning
supervised learning model
Support vector machines
IoT
back-end database
Big Data
Cloud Computing
cloud-hosted Web applications
collaboration
confidential data
Data mining
Data models
Human behavior
Internet of Things
Artificial Intelligence
learning (artificial intelligence)
learning automata
Microsoft Azure Machine Learning
ML algorithms
pattern classification
pattern-driven corpus
Policy
policy-based governance
Policy-Governed Secure Collaboration
Predictive Analytics
biblio
A new tool for lightweight encryption on android
Submitted by BrandonB on Mon, 05/04/2015 - 1:07pm
information security risk
Throughput
SUN JCE cryptographic provider
stream ciphers
standards
smart phones
PBKDF2 password based key generation method
PBKDF2
password based authentication
NCRYPT application
mobile device
lightweight encryption scheme
Lightweight Encryption
JNI
Java native interface
AES encryption scheme
information security
HummingBird2
Hummingbird-2 scheme
encryption
DES encryption scheme
Cryptography
cryptographic key
cryptographic algorithms
confidential data
Ciphers
C language
block ciphers
Android platform
android
biblio
Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices
Submitted by BrandonB on Fri, 05/01/2015 - 9:23am
software-based security protocol
hardware-based trusted platform module mechanism
key management
privacy
Protocols
secure data sharing protocol
secure multiparty data sharing
security
security key
security model
hardware-based TPM devices
store data
TED
tpm
TPM mechanism
Trusted Computing
trusted enterprise
trusted extension device
untrusted cloud services
cryptographic keys
access control management
authorisation
authorised consumer
BYOD
Cloud Computing
cloud computing infrastructure
cloud enterprise
confidential data
Access Control
Cryptographic Protocols
data consumers
Data models
data owner
data privacy
Data Security
data sharing
encryption