Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption algorithm
biblio
An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption
Submitted by aekwall on Mon, 01/10/2022 - 11:46am
information security
internet
encryption
pubcrawl
Metrics
Human behavior
Elliptic curve cryptography
asymmetric algorithm
data science
encryption algorithm
hybrid encryption
information processing
symmetric algorithm
Asymmetric Encryption
Resiliency
Compositionality
biblio
Encryption algorithm based on knight’s tour and n-neighbourhood addition
Submitted by aekwall on Mon, 02/15/2021 - 3:50pm
Knight’s Tour Matrix
Signal processing algorithms
signal processing
Resiliency
pubcrawl
Partitioning algorithms
n-neighbourhood addition
n-neighborhood addition
Matrix converters
matrix algebra
KT matrix
Knight’s Tour Problem (KTP)
composability
Knight's Tour Problem
knight tour matrix
Image Processing
image encryption
encryption algorithm
encryption
efficient encryption
digital images
cyber physical systems
Cryptography
cover images
biblio
Multi-Authority Attribute-Based Encryption for Resource-Constrained Users in Edge Computing
Submitted by aekwall on Mon, 08/17/2020 - 10:41am
Computational modeling
outsourced decryption
Online/Offline Encryption
multiauthority attribute-based encryption
Multi-Authority Attribute-Based Encryption
MA-ABE schemes
large-universe MA-CP-ABE scheme
ciphertext pool
encryption algorithm
Performance analysis
fine-grained access control
edge computing
IoT
policy-based governance
pubcrawl
Human behavior
Internet of Things
attribute-based encryption
data privacy
Access Control
encryption
Cryptography
authorisation
Scalability
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
A Novel Encryption Algorithm based on DNA Cryptography
Submitted by aekwall on Mon, 06/22/2020 - 10:27am
encoding
plain-text
DNA symmetric cryptography
DNA computing
biocomputing
DNA cryptography
confidential data
encryption algorithm
cryptographic algorithm
encryption process
Cryptography
Predictive Metrics
Ciphers
DNA
privacy
pubcrawl
Human behavior
Resiliency
information security
encryption
biblio
A New Approach of Digital Signature Verification based on BioGamal Algorithm
Submitted by aekwall on Mon, 06/22/2020 - 10:25am
Communication Network
SHA algorithm
secured digital signature algorithm
secure hash code
secure digital signature
existing PlayGamal algorithm
digital signature verification
BioGamal algorithm
encryption algorithm
sensitive information
security of data
digital signature
verification
digital signatures
Cryptography
pubcrawl
Resiliency
security
Data Security
Scalability
biblio
Security of Cloud Storage based on Extended Hill Cipher and Homomorphic Encryption
Submitted by aekwall on Mon, 06/08/2020 - 10:35am
Homomorphic encryption
storage management
Servers
security
Scalability
Resiliency
pubcrawl
Metrics
matrix multiplication
Matrix converters
information security
Human Factors
Ciphers
extended hill cipher encryption
Extended Hill Cipher
encryption algorithm
encryption
data storage
data privacy
Cryptography
cloud storage
cloud providers
cloud network
Cloud Computing
biblio
Multimodal Data Security Framework Using Steganography Approaches
Submitted by aekwall on Mon, 06/01/2020 - 9:42am
advanced encryption standard
honey pots
Steganography approaches
multimodal data security framework
multimodal
least significant bit
information hiding strategies
heuristic intrusion detection
Augmented Reality Steganography
ARSteg
encryption algorithm
Steganography
augmented reality
framework
Scalability
Human Factors
unauthorized users
pubcrawl
password
authentication
Resiliency
data encryption
security
decryption
Conferences
encryption
Cryptography
Servers
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
1
2
next ›
last »