Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Asymmetric Encryption
biblio
New Direction of Cryptography: A Review on Text-to-Image Encryption Algorithms Based on RGB Color Value
Submitted by aekwall on Mon, 01/25/2021 - 12:57pm
image colour analysis
text-to-image encryption algorithms
Text-to-Image Encryption
survey
RSA and AES
RGB Value
RGB color value
keeping data
global network
data encryption techniques
Comparison
Asymmetric Encryption
symmetric encryption algorithms
asymmetric encryption algorithms
sensitive data
Cryptography
Software algorithms
public key cryptography
Public key
Image color analysis
text analysis
Databases
Metrics
composability
pubcrawl
Human behavior
Resiliency
Receivers
encryption
biblio
A survey on Symmetric and Asymmetric Key based Image Encryption
Submitted by aekwall on Mon, 01/25/2021 - 12:56pm
Asymmetric Encryption
technological advancements especially wireless sensor network
symmetric
image encryption techniques
image destruction
era security
encryption approaches
encryption algorithms
different transfer mediums
cipher text
asymmetric key
Asymmetric
Cryptography
decryption
Image Processing
authenticity
Image coding
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
encryption
biblio
A Modified Tiny Asymmetric Encryption for Secure Ftp to Network
Submitted by aekwall on Mon, 01/25/2021 - 12:56pm
client-server systems
server-client innovation
secure FTP
secret key verification
modified tiny asymmetric encryption
Asymmetric Encryption
file transfer protocol
Elliptic curve cryptography
Java
Servers
Metrics
Protocols
composability
pubcrawl
Human behavior
Resiliency
private key cryptography
encryption
biblio
Construction and Evaluation of Attribute-Based Challenge-and-Response Authentication on Asymmetric Bilinear Map
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
asymmetric case
type-3 pairing
TEPLA library
Ostrovsky-Sahai-Waters
original ABKEM
one-way-CCA security
concurrent man-in-the-middle security
challenge-and-response protocol
challenge and response
BN curve
attribute-based key-encapsulation mechanisum
attribute based
asymmetric pairing
Cryptographic Protocols
asymmetric bilinear map
ABAuth
Asymmetric Encryption
Computational efficiency
Compositionality
authentication
digital signatures
Metrics
pubcrawl
Human behavior
Resiliency
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
SE-Enc: A Secure and Efficient Encoding Scheme Using Elliptic Curve Cryptography
Submitted by aekwall on Mon, 08/10/2020 - 10:50am
ECC
trusted scheme
SE-Enc
encoding scheme
asymmetric cryptography
Asymmetric Encryption
signature
Internet of Things devices
Compositionality
authenticated encryption
encoding
security requirements
encryption
Elliptic curves
Elliptic curve cryptography
Heuristic algorithms
public key cryptography
message authentication
Metrics
pubcrawl
Human behavior
Resiliency
Trusted Computing
Internet of Things
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Asymmetric Encryption
securing multiparty communication
MultiRSA
multiple recipients
Multi-recipient Encryption
lightweight scalable multirecipient asymmetric cryptographic scheme
lightweight AMOUN
high computational cost
group membership changes
dynamic networks
chosen plaintext attack
Chinese remainder theorem
Cathode ray tubes
asymmetric cryptography
communication overhead
encryption
network resources
symmetric cryptography
Compositionality
Security analysis
public key cryptography
Public key
Metrics
privacy
pubcrawl
Human behavior
Resiliency
decryption
Computational efficiency
biblio
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
Data Security
searchable encryption
Resiliency
Human behavior
pubcrawl
Metrics
Cloud Security
Compositionality
Asymmetric Encryption
boolean query
biblio
Asymmetric Physical Layer Encryption for Wireless Communications
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
quantisation (signal)
Wireless communications
quantized information entropy
private channel
possible eavesdroppers
orthogonal frequency-division multiplexing (OFDM)
cryptographic primitive
constellation confusion degree
complex-domain signals
asymmetric PLE
asymmetric physical layer encryption scheme
Asymmetric Encryption
radio receivers
Wireless communication
wireless channels
encryption
Compositionality
Elliptic curve cryptography
physical layer security
Physical layer
public key cryptography
error statistics
Entropy
Metrics
pubcrawl
Human behavior
Resiliency
telecommunication security
Receivers
biblio
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
Submitted by aekwall on Mon, 08/10/2020 - 10:49am
elliptic curve ElGamal encryption
chaotic theory
Chosen-plaintext attack
cipher image
crossover permutation
diffusion combined chaos game
DNA sequence
EC-ElGamal
elliptic curve ElGamal cryptography
chaotic index sequence
generated scrambled image
image secure communications
key management problems
novel asymmetric image encryption method
plain-image
potential security problem
SHA-512 hash
symmetric image encryption schemes
Elliptic curves
encryption
Resiliency
Human behavior
pubcrawl
Metrics
DNA
public key cryptography
Elliptic curve cryptography
Cryptography
chaos
chaotic communication
Compositionality
chaotic system
image sequences
Asymmetric Encryption
chaos game
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »