Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Ciphertext
biblio
Advanced Encryption Standard Algorithm with Optimal S-box and Automated Key Generation
Submitted by grigby1 on Fri, 03/31/2023 - 10:25am
delays
Throughput
Resiliency
resilience
Random access memory
Metrics
Lookup Table (LUT)
Heuristic algorithms
encryption
-AES
Data Security
Cryptography
computer architecture
Ciphertext
biometrics (access control)
pubcrawl
biometric encryption
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
least significant bit
weak security
unsecured operating systems
uncompensatory loss
tampering counterfeiting
suboptimal multimedia applications
Steganography
Smart Systems
Signal processing algorithms
Scalability
Resiliency
Receivers
public key cryptography
pubcrawl
Metrics
LSB watermarking
banking applications
information security
information cloning
image watermarking
image enhancement
Hill cipher algorithm
Hill Cipher
Elliptic curve cryptography
ECC algorithm
discrete cosine transforms
discrete cosine transform
DCT coefficients
Data Security
Cryptography
Ciphertext
Ciphers
biblio
Best Strategies of Choosing Crypto-System’s Key for Cryptographer and Attacker Based on Game Theory
Submitted by grigby1 on Fri, 09/04/2020 - 2:24pm
policy-based governance
brute force attacks
plaintext
key space
information theory
cryptosystem key
cryptographer
Crypto-System
Brute Force Attack
game theory
Ciphers
Ciphertext
Human Factors
Games
collaboration
pubcrawl
Security Evaluation
Mathematical model
Cryptography
biblio
Quantum Low Probability of Intercept
Submitted by grigby1 on Fri, 06/19/2020 - 10:34am
Metropolitan area networks
telecommunication security
Resiliency
resilience
Receivers
quantum low probability of intercept
pubcrawl
probability
Photonics
optical fibre networks
optical fiber
OCIS codes
Monitoring
metropolitan-area distances
(060.1660) Coherent communications
Metrics
forward error correction
error probability
eavesdropping
eavesdropper
decryption key
Cryptography
composability
Ciphertext
Brightness
(270.5568) Quantum cryptography
(270.5565) Quantum communications
biblio
An Attribute-Based Searchable Encryption Scheme Supporting Trapdoor Updating
Submitted by grigby1 on Thu, 09/26/2019 - 9:27am
cloud computing environment
searchable encryption
trapdoor updating
online/offline keyword guessing attack
online-offline keyword guessing attack
data files
CSES-TU
Ciphertext
attribute-based searchable encryption schemes
attribute-based searchable encryption scheme
attribute-based searchable encryption
fine-grained access control
search problems
Cloud Computing
authorisation
Cryptography
Servers
encryption
composability
Resiliency
pubcrawl
resilience
data privacy
cloud storage
Access Control
biblio
A DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
public key cryptography
finite values
fixed sized chunk
Human behavior
Metrics
Paillier
Paillier cryptosystems
plaintext
pubcrawl
equivalent binary value
random processes
random strings
Receivers
resilience
Resiliency
RSA
Transforms
asymmetric cryptosystem
equivalent ASCII values
encryption
encoding
ElGamal cryptosystems
ElGamal
dynamic DNA encoding
DNA cryptography
DNA cryptographic technique
DNA bases
DNA
data secrecy
Compositionality
Ciphertext
biocomputing
Asymmetric Encryption
biblio
Asymmetrical quantum encryption protocol based on quantum search algorithm
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
quantum cryptography
unitary operations
trapdoor one-way functions
symmetrical quantum key distribution
single photon measurement
secret messages
search quantum algorithm
search problems
quantum search algorithms
quantum search algorithm
Quantum mechanics
quantum information science
asymmetrical encryption
private-information
no-cloning theorem
key-generation randomized logarithm
information-theoretical security
Elliptic curve cryptography
Cryptography
Cryptographic Protocols
Ciphertext
Ciphers
asymmetrical quantum encryption protocol
biblio
Secure data communication and cryptography based on DNA based message encoding
Submitted by BrandonB on Tue, 05/05/2015 - 8:27am
cipher text
Ciphertext
Coded message
confidential message transfer
Cryptography
data communication security
Digital audio players
DNA
DNA based encryption algorithm
DNA based message encoding
DNA sequence
Encoding tools
Final Cipher