Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cipher text
biblio
A survey on Symmetric and Asymmetric Key based Image Encryption
Submitted by aekwall on Mon, 01/25/2021 - 11:56am
Asymmetric Encryption
technological advancements especially wireless sensor network
symmetric
image encryption techniques
image destruction
era security
encryption approaches
encryption algorithms
different transfer mediums
cipher text
asymmetric key
Asymmetric
Cryptography
decryption
Image Processing
authenticity
Image coding
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
encryption
biblio
SCLCT: Secured cross language cipher technique
Submitted by grigby1 on Wed, 02/21/2018 - 12:44pm
Rails
Metrics
modern era possesses cryptography
open source language
Policy
Policy-Governed Secure Collaboration
privacy
pubcrawl
Rail Fence Cipher
Java
resilience
Resiliency
Scalability
SCLCT Cipher
secret codes
secured cross language cipher technique
security
cryptology
Caesar Cipher
cipher text
Ciphers
CLCT Cipher
collaboration
composability
computing device
Cryptography
automation
data privacy
empowering citizens
encryption
evolving digitization
fascinating science
Human behavior
human factor
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator
biblio
Providing advanced security mechanism for scalable data sharing in cloud storage
Submitted by grigby1 on Fri, 11/03/2017 - 10:30am
public key cryptography
trees (mathematics)
tree structure
standards
smart cards
Smart card
single key file encryption
Servers
security of data
secret key aggregation
Scalable Security
scalable data sharing
Scalability
public-key cryptosystems
advanced security mechanism
public key crypto system
pubcrawl
KAC
encryption
decryption right allocation
data handling
cloud storage
Cloud Computing
Ciphers
cipher texts
cipher text
Aggregates
biblio
"HRJ_encryption: An ASCII code based encryption algorithm and its implementation"
Submitted by grigby1 on Tue, 02/14/2017 - 11:10am
information technology
Secret key
Receivers
public key cryptography
Public key
pubcrawl170102
private key cryptography
private key
Plain Text
personal desktop
Algorithm design and analysis
HRJ_encryption
encryption
decryption
Cloud Computing
cipher text
ASCII code based encryption algorithm
ASCII Code
arrays
biblio
Secure data communication and cryptography based on DNA based message encoding
Submitted by BrandonB on Tue, 05/05/2015 - 8:27am
cipher text
Ciphertext
Coded message
confidential message transfer
Cryptography
data communication security
Digital audio players
DNA
DNA based encryption algorithm
DNA based message encoding
DNA sequence
Encoding tools
Final Cipher