Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DNA
biblio
DNA based Computing Encryption Scheme Blending Color and Gray Images
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
Human behavior
encryption
Encryption Biometric image
encryption key
encryption scheme blending color
face recognition
fingerprint identification
fingerprint image
Fingerprint recognition
gray fingerprint images
DNA sequence
Image coding
Image color analysis
image colour analysis
image sequences
matrix algebra
Predictive Metrics
privacy
pubcrawl
Resiliency
Cipher
resilience
Scalability
Metrics
attacks
authentication
authorisation
biometric image
Blending
blending images
biometric encryption
color images
computing method
Conversions
Cryptography
DNA
DNA computing
DNA computing algorithm
DNA cryptography
biblio
Medical Image Compression and Encryption using Chaos based DNA Cryptography
Submitted by aekwall on Mon, 02/08/2021 - 1:51pm
encryption
Resiliency
Human behavior
pubcrawl
privacy
DNA
Image coding
Ciphers
Predictive Metrics
Transforms
Biomedical imaging
DNA cryptography
discrete wavelet transforms
Discrete Haar Wavelet Transform
lossless compression
medical image encryption
biblio
Design and Implementation of DNA Based Cryptographic Algorithm
Submitted by aekwall on Mon, 02/08/2021 - 1:50pm
S-box
pipeline processing
half cryptographic framework
DNA based S-box
DNA based cryptographic algorithm
current security
Circuits and systems
Artix-7 device
AES-Algorithm
biocomputing
DNA cryptography
security
cryptographic algorithm
Predictive Metrics
DNA
privacy
standards
pubcrawl
Human behavior
Resiliency
encryption
Cryptography
biblio
File Encryption and Decryption Using DNA Technology
Submitted by aekwall on Mon, 02/08/2021 - 1:50pm
deoxyribo nucleic acid sequence
arbitrary keys generation
authorized persons
binary-coded form
common key
cryptographic process
data forwarding
data hijacking
data transmutation
appropriate form
DNA technology
file decryption
file encryption
intermediate steps
original texted message
unknown form
users data security
Cryptography
DNA sequence
DNA cryptography
decryption
encoding
data hiding
Predictive Metrics
public key cryptography
DNA
privacy
pubcrawl
Human behavior
Resiliency
Receivers
Conferences
encryption
biblio
Intrusion detection for Internet of Things applying metagenome fast analysis
Submitted by grigby1 on Thu, 10/29/2020 - 11:32am
Intrusion Detection
Task Analysis
Resiliency
resilience
pubcrawl
Metrics
metagenome
manet attack prevention
malware
bioinformatics
Internet of Things
information security
genomics
DNA
de Bruijn graph
Databases
Compositionality
biblio
Biometric Authentication Security System Using Human DNA
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
biometric encryption
System authentication
human DNA based security systems
Human DNA
human biometric characteristics
cryptosystem technique
Cryptography System
biometric authentication security system
biometric features
DNA
Cryptography
system security
resilience
biometrics (access control)
Scalability
message authentication
Resiliency
Metrics
pubcrawl
biblio
Data Security Enhancement in Cloud Computing Using Multimodel Biometric System
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
DNA encryption
biometric encryption
DNA
AES cipher
data centers
data hiding
data leak
data security enhancement
DNA cipher
confidential information
Encoding and Decoding
information storage
multimodal biometric system
multimodel biometric system
multiple security system
polymers
security authentication
unauthorized access
Cloud Computing
Cryptography
authorisation
pubcrawl
Metrics
Resiliency
Conferences
AES
Scalability
Ciphers
encoding
biometrics (access control)
Data Security
resilience
smart phones
confidential data
information retrieval
Smartphones
biblio
Smart Cards with Biometric Influences: An Enhanced ID Authentication
Submitted by grigby1 on Fri, 08/28/2020 - 3:43pm
biometrics integration
smartcards
smart cards
Smart card
Processing time
privacy concerns
possible biometric solution
identity authentication
human interfaces
human beings
highly reliable support system
FRR
FAR
enhanced ID authentication
DNA technology
DNA
Cryptography
biometric technologies
biometric techniques
biometric key considerations
biometric influences
biometric encryption
biometrics
biometric technology
resilience
biometrics (access control)
Scalability
data privacy
Resiliency
Metrics
pubcrawl
biblio
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
elliptic curve ElGamal encryption
chaotic theory
Chosen-plaintext attack
cipher image
crossover permutation
diffusion combined chaos game
DNA sequence
EC-ElGamal
elliptic curve ElGamal cryptography
chaotic index sequence
generated scrambled image
image secure communications
key management problems
novel asymmetric image encryption method
plain-image
potential security problem
SHA-512 hash
symmetric image encryption schemes
Elliptic curves
encryption
Resiliency
Human behavior
pubcrawl
Metrics
DNA
public key cryptography
Elliptic curve cryptography
Cryptography
chaos
chaotic communication
Compositionality
chaotic system
image sequences
Asymmetric Encryption
chaos game
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »