Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DNA
biblio
Development Of A Novel Security Scheme Using DNA Biocryptography For Smart Meter Data Communication
Submitted by grigby1 on Tue, 01/07/2020 - 10:52am
electroencephalography
smart meters
smart meter data communication
smart meter communication
Simulink/Matlab
secure communication
Resiliency
resilience
pubcrawl
privacy
Predictive Metrics
Metrics
lightweight encryption scheme
Human behavior
Handheld computers
encryption
2-phase DNA cryptography
DNA cryptography
DNA
Diffie Hellman scheme
DH-EAB key exchange scheme
Data Security
data privacy
data communication
Cryptography
Communications technology
biology computing
Biocryptography
AMI security
AMI communication network
advanced security mechanisms
advanced metering infrastructure
biblio
Parallel DNA Computing Model of Point-Doubling in Conic Curves Cryptosystem over Finite Field GF(2ˆn)
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
mathematical curves
Tile Assembly Model
self-assembly
Resiliency
resilience
public key cryptography
pubcrawl
privacy
Predictive Metrics
point-multiplication
point-doubling
point-addition
Point doubling
parallel DNA computing model
Metrics
biocomputing
Human behavior
Galois fields
Finite Field GF(2ˆn)
finite field GF
encoding
Elliptic curves
Elliptic curve cryptography
DNA cryptography
DNA computing
DNA
Cryptographic Protocols
conic curves cryptosystem over finite held
Conic Curves Cryptosystem
Computational modeling
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
intensive data computing
trust
storage
security solution
security schema
security
secured outsourcing
Resiliency
resilience
pubcrawl
protection
private data
privacy
outsourcing
Metrics
Internet service
Cloud Computing
integrity
Human behavior
encryption
encoding
DNA cryptography
DNA
data center
Cryptography
confidentiality
completely secure migration
cloud service providers
cloud provider
cloud computing technology
cloud computing paradigm
biblio
A DNA-Sticker Algorithm for Cryptanalysis LFSRs and NLFSRs Based Stream Cipher
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
linear feedback shift register based stream cipher
decision technique
DNA computing
DNA Cryptanalysis
DNA molecules
DNA sticker model based algorithm
DNA-based algorithm
Electron tubes
genetic bases
key stream bit
LFSR
LFSRs equation
cryptographic systems
molecular biophysics
molecular computing
NLFSR
NLFSRs
nonlinear feedback shift register based stream cipher
parallel computations
parallel search
shift registers
Sticker-Model
TEST TUBE
feedback
Computational modeling
resilience
pubcrawl
Human behavior
Metrics
Cryptography
cryptanalysis
search problems
Ciphers
DNA
privacy
Resiliency
stream cipher
biocomputing
biological operations
Adelman's DNA computing experiment
algebra
algebraic code
bit string
cipher characters
computability model
biblio
Double Encryption Using TEA and DNA
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
Ciphers
TEA
secure network communication
passive attacks
Double encryption
data intruders
active attacks
active and passive attacks
decryption time
Resiliency
cryptographic algorithms
DNA
privacy
digital signatures
Data Security
Receivers
Data Transmission
information security
Cryptography
encryption
Metrics
Human behavior
pubcrawl
resilience
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 10:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
biblio
Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations
Submitted by grigby1 on Tue, 01/07/2020 - 10:50am
Metrics
encryption
Generators
Hadamard matrices
Hadamard matrix
Human behavior
internet
Knight Tour
Knight tour movement
dynamic key generation
privacy
pubcrawl
random DNA sequence
randomness
resilience
Resiliency
secret data transformation
attack operations
DNA reference nucleotides locations
DNA Gen Bank reference
DNA encryption technique
DNA encryption algorithm
DNA cryptography
DNA arithmetic
DNA
deoxyribonucleic acid
Cryptography
Ciphers
Blum Blum Shub generator
biological operations
bioinformatics
BBS-DNA sequence
BBS generator
biblio
A Dynamic DNA for Key-Based Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 10:50am
geographical cryptography
traditional cryptographic approaches
text file
Resiliency
resilience
Reliability
Receivers
quantum cryptography
pubcrawl
privacy
plain text characters
Metrics
key-based cryptography
image file
Human behavior
audio file
encryption
encoding
effective cryptographic systems
dynamic DNA
DNA sequences
DNA digital coding
DNA cryptography
DNA
decryption
Cryptography
Ciphers
biometrics (access control)
biometric cryptography
biocomputing
biblio
Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules
Submitted by aekwall on Mon, 04/29/2019 - 9:50am
DNA cryptography
BIOS Security
Cyber-Bio Security
DNA
Human behavior
Identity Based Signatures
Metrics
pubcrawl
Reed-Solomon codes
Resiliency
Scalability
biblio
An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based Cryptography
Submitted by grigby1 on Thu, 02/14/2019 - 11:13am
Ciphers
composability
Compositionality
computer security
decryption
DNA
DNA cryptography
encoding
encryption
Enhanced polyalphabetic Cipher algorithm
pubcrawl
theoretical cryptography
Vigenere cipher
« first
‹ previous
1
2
3
4
5
6
7
8
next ›
last »