Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption key
biblio
DNA based Computing Encryption Scheme Blending Color and Gray Images
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
Human behavior
encryption
Encryption Biometric image
encryption key
encryption scheme blending color
face recognition
fingerprint identification
fingerprint image
Fingerprint recognition
gray fingerprint images
DNA sequence
Image coding
Image color analysis
image colour analysis
image sequences
matrix algebra
Predictive Metrics
privacy
pubcrawl
Resiliency
Cipher
resilience
Scalability
Metrics
attacks
authentication
authorisation
biometric image
Blending
blending images
biometric encryption
color images
computing method
Conversions
Cryptography
DNA
DNA computing
DNA computing algorithm
DNA cryptography
biblio
Mesh Based Obfuscation of Analog Circuit Properties
Submitted by aekwall on Mon, 11/09/2020 - 1:41pm
satisfiability modulo theory based algorithm
Design methodology
effective transistor dimensions
enhanced security
key based obfuscation technique
LC tank voltage-controlled oscillator
mesh topology
obfuscated circuitry
obfuscated transistors
obfuscation methodology
physical dimensions
SAT
circuit functionality
SMT
target frequency
transistor circuits
transistor sizes
Transistors
varactor transistor
Varactors
VCO
voltage amplitude
voltage-controlled oscillators
encryption key
Resiliency
pubcrawl
composability
policy-based governance
probability
Topology
reverse engineering
computability
operating frequency
Threshold voltage
Cryptography
circuit design
IP piracy
2×6 mesh structure
analog circuit properties
Analog circuits
analog obfuscation
analog satisfiability algorithm
aSAT algorithm
auto-determine
Brute Force Attack
biblio
A Novel PUF based Logic Encryption Technique to Prevent SAT Attacks and Trojan Insertion
Submitted by aekwall on Mon, 11/09/2020 - 1:33pm
intellectual property/IC
IP piracy
SAT attack
hardware obfuscation
Anti-Trojan insertion algorithm
Controllability
copy protection
design-for-trust
hardware Trojan insertion
HT insertion
hardware trojan
logic encryption methods
logic encryption techniques
logic locking
PUF based logic encryption technique
PUF-based encryption
Rare Signal
reverse engineering attack
unique encryption
Hardware Security
encryption
Hardware
invasive software
Resiliency
pubcrawl
composability
policy-based governance
Trojan horses
integrated circuits
Cryptography
Topology
Logic gates
industrial property
reverse engineering
integrated circuit design
logic circuits
Physical Unclonable Function
encryption key
biblio
Securing smart grid data under key exposure and revocation in cloud computing
Submitted by grigby1 on Fri, 07/24/2020 - 12:50pm
key exposure
Data collection
Cipher Text Policy-Attribute Based Encryption (CP-ABE)
advanced cipher text policy attribute
and smart grid
cloud supported IoT
encrypted key
encryption key
encryption process
enhancing system ability
revocation
obtaining security
security requirements
smart grid data security method
smart grid systems data
smart IoT devices
system failures
transmission process
collaboration
power engineering computing
Cryptography
encryption
Internet of Things
authorisation
Cloud Computing
data privacy
Servers
Scalability
Ciphers
power system security
Smart Grids
smart power grids
data owner
cloud server
pubcrawl
policy-based governance
CP-ABE
biblio
Distributed Image Encryption Based On a Homomorphic Cryptographic Approach
Submitted by aekwall on Mon, 06/08/2020 - 11:35am
homomorphic encryption function
Scalability
RGB image encryption
Resiliency
red green blue image
pubcrawl
pixel intensity sub-values
Paillier Cryptographic System
original RGB image
Metrics
individually encrypted pixel intensity sub-values
image security problem
image encryption
image colour analysis
Human Factors
associated encrypted images
Homomorphic encryption
highly secure encrypted images
encryption phase
encryption key
encrypted component image
distributed image encryption approach
Distributed Image Encryption
distributed homomorphic image encryption scheme
Cryptography
constituent channel images
cipher-images
channel image
B-channel images
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Document Certificate Authentication System Using Digitally Signed QR Code Tag
Submitted by aekwall on Mon, 09/23/2019 - 10:46am
Cryptography
Resiliency
pubcrawl
authentication
cyber physical systems
Degree certificate
digital signature
encryption key
QR code
QR codes
biblio
Dynamic Ransomware Protection Using Deterministic Random Bit Generator
Submitted by grigby1 on Thu, 05/24/2018 - 12:16pm
protection
Scalability
Resiliency
resilience
Ransomware
random number generator
random number generation service
random number generation
random key generation
public key cryptography
Public key
pubcrawl
Communication networks
Metrics
malware
Human behavior
Generators
encryption key
encryption
dynamic ransomware protection method
deterministic random bit generator
CryptoVirus
crypto-API
computer viruses
biblio
Secure Cloud Storage and File Sharing
Submitted by grigby1 on Mon, 03/19/2018 - 1:35pm
secure file sharing mechanism
online cloud services
pubcrawl
re-encryption
resilience
Resiliency
seamless file sharing technique
secure cloud storage
secure data-storage services
Secure File Sharing
native machines
security
security failure rates
security risks
security tools
Servers
sophisticated techniques
storage management
storage necessities
storage space
data maintenance
Cloud Computing
cloud service provider
cloud storage service providers
complex techniques
composability
computing resources
confidentiality
Cryptography
data integrity
Access Control
DIP
disintegration protocol
elastic data-storage services
encryption
encryption key
enormous volumes
Fingerprint recognition
Human behavior
Metrics
biblio
Security analysis of the RBS block cipher
Submitted by grigby1 on Mon, 11/13/2017 - 11:55am
radiofrequency identification
Wireless communication
Time Frequency Analysis
Time complexity
telecommunication security
Security analysis
security
Scalability
S-box
RFID systems
Resiliency
RBS design
RBS block cipher
radiofrequency identification systems
Algorithm design and analysis
pubcrawl
P-box
Metrics
lightweight encryption algorithm
encryption key
encryption
decryptions
data complexity
Cryptography
conventional block cipher elements
computational complexity
Ciphers
authentication
1
2
next ›
last »