Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DES
biblio
A single, triple chaotic cryptography using chaos in digital filter and its own comparison to DES and triple DES
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
Data Encryption Standard
triple form
Triple DES
triple chaotic cryptography
single chaotic cryptography
Sensitivity
rayscale image
Periodic structures
performance speed
multimedia cryptography
MatLab simulation
Digital filters
DES
Cryptography
Chaos in Digital Filter
chaotic cryptography
chaos
Predictive Metrics
digital filter
computational complexity
Data protection
composability
pubcrawl
Resiliency
encryption
biblio
Performance Analysis of Symmetric Key Cryptographic Algorithms
Submitted by grigby1 on Tue, 10/15/2019 - 1:45pm
secure data transfers
memory usage
Metrics
online data exchange
Performance analysis
practical implementation
pubcrawl
Repudiation
resilience
Resiliency
Memory management
secure payment
Signal processing algorithms
Symmetric key algorithms
symmetric key cryptographic algorithms
Three-dimensional displays
Throughput
transactions
unauthorized people
decryption time
AES
avalanche effect
battery consumption
Blowfish
composability
Cryptography
customers requirement
datas security
Data Transmission
3DES
DES
ECB
encryption
encryption time
energy consumption
Human behavior
internet secure
Java
biblio
Studied on Application of Double Encryption Algorithm in Covert Channel Transmission
Submitted by grigby1 on Thu, 09/05/2019 - 10:25am
intelligent mobile terminal
Transportation
transmission process
telecommunication security
symmetric encryption
smart cities
Security transmission
Scalability
RSA
resilience
mobile terminal data transmission
mobile intelligent terminal
mobile computing
asymmetric encryption algorithm
file transfer
double encryption algorithm
Double encryption
DES
Cryptography
covert transmission
covert channels
covert channel transmission
covert channel
Conferences
Compositionality
Big Data
biblio
Comprehensive Study of Symmetric Key and Asymmetric Key Encryption Algorithms
Submitted by grigby1 on Mon, 04/02/2018 - 11:48am
DSA
Three-dimensional displays
standards
Resiliency
resilience
Public key
pubcrawl
private and public key encryption
Metrics
Human behavior
encryption
elliptic curve
3DES
Diffie-Hellman and RSA
DES
decryption
Cryptography
Compositionality
Cloud Computing
Classification algorithms
Ciphers
Blowfish
Asymmetric Encryption
AES
biblio
Using timed automata and fuzzy logic for diagnosis of multiple faults in DES
Submitted by grigby1 on Thu, 02/15/2018 - 10:47am
identification phase
Valves
timed automata
temporal parameters
temporal evolution
sensors
Resiliency
resilience
pubcrawl
normal operation
multiple fault diagnosis
monitoring time operation
Monitoring
Metrics
Mathematical model
location
actuators
Human Factors
human factor
Human behavior
Fuzzy logic
filling system
faulty operation
fault diagnosis
failure diagnosis
discrete event systems
Diagnosis
DES
default
Clocks
automata theory
automata
biblio
A high speed implementation counter mode cryptography using hardware parallelism
Submitted by grigby1 on Thu, 04/20/2017 - 11:41am
parallel computing
hardware parallelism
Heracles toolkit
high speed implementation counter mode cryptography
network-on-chip
network on chip
Network on Chip(NoC)
network on chip security
NoC
graphics processing units
pubcrawl
Resiliency
Scalability
secure data transmission
security mechanisms
Software algorithms
unsecured networks
DES
Big Data
composability
Counter Mode Cryptography (CTR)
CPU
Cryptography
CTR
data encryption standard core
Data Encryption Standard (DES)
Algorithm design and analysis
encryption
field programmable gate arrays
FPGA
FPGA board
gpu
Grafic Process Unite(GPU)
graphics processing unit
biblio
COALA - System for Visual Representation of Cryptography Algorithms
Submitted by BrandonB on Tue, 05/05/2015 - 10:44am
RSA algorithm
Diffie-Hellman
Diffie-Hellman algorithm
educational courses
Educational institutions
educational software systems
engineering sciences
further education
RSA
DES algorithm
School of Electrical Engineering
security education
Software algorithms
student attitudes
student knowledge acquisition
University of Belgrade
visualization
AES
DES
Data visualization
data visualisation
data security course
Data Security
cryptography algorithms
Cryptography
cryptographic algorithms
cryptographic algorithm visual representation
computer science education
computer aided instruction
COALA system
algorithm visualization
Algorithm design and analysis
AES algorithm
« first
‹ previous
1
2