Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaos
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
Lyapunov-based adaptive technique
Transmitters
time series
telecommunication channels
Resiliency
Receivers
public communication channel
pubcrawl
Predictive Metrics
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
chaotic cryptography
Lyapunov methods
internet
Encryption technique
Cryptography
crypto-analysis methods
composability
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
biblio
Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
2D mapping function
Two dimensional displays
speech cryptography
speech coding
modified Euler system
Lorenz 3D mapping
Henon mapping
euler numerical resolution
Chaotic Mapping
audio signal processing
audio file
audio cryptography system
3D mapping function
Cryptography
chaotic cryptography
Three-dimensional displays
chaotic communication
chaos
Predictive Metrics
information technology
composability
pubcrawl
Resiliency
Conferences
encryption
biblio
A single, triple chaotic cryptography using chaos in digital filter and its own comparison to DES and triple DES
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
Data Encryption Standard
triple form
Triple DES
triple chaotic cryptography
single chaotic cryptography
Sensitivity
rayscale image
Periodic structures
performance speed
multimedia cryptography
MatLab simulation
Digital filters
DES
Cryptography
Chaos in Digital Filter
chaotic cryptography
chaos
Predictive Metrics
digital filter
computational complexity
Data protection
composability
pubcrawl
Resiliency
encryption
biblio
Hardware Implementation of Dynamic Key Value Based Stream Cipher Using Chaotic Logistic Map
Submitted by grigby1 on Tue, 10/08/2019 - 3:44pm
Random sequences
NIST statistical
nonrecursive key
private key cryptography
PRNG
pseudorandom number generation
pseudorandom sequence generation
pubcrawl
public key cryptography
random key generation
random number generation
Metrics
randomness tests
resilience
Resiliency
Scalability
stream cipher
symmetric key chaos based cryptography
Thermal analysis
Verilog HDL
X-power
Xilinx device
FPGA device
binary sequence
binary sequences
chaos
Chaos based cryptography
chaotic logistic map
Ciphers
dynamic key value based stream cipher
embedded systems
field programmable gate arrays
Field programmable gated array
asymmetric key chaos based cryptography
frequency 62.2 MHz
Hardware
Hardware Security
hardware-based embedded system
Human behavior
key scheduling
key stream
logistic map
Logistics
biblio
A Provable Secure Image Encryption Schema Based on Fractional Order Chaotic Systems
Submitted by aekwall on Mon, 09/23/2019 - 9:25am
Fractional order chaos
Compositionality
provable security
provable secure image encryption schema
Nonlinear signal processing
information security applications
Image Processing
image encryption
Histograms
fractional order chaotic systems
Cryptography
discrete time chaotic systems
continuous time chaotic systems
chaotic communication
chaos
Predictive Metrics
Signal processing algorithms
pubcrawl
Resiliency
encryption
biblio
Hardware Implementation of Multi-Scroll Chaos Based Architecture for Securing Biometric Templates
Submitted by grigby1 on Fri, 03/22/2019 - 11:35am
hardware resources
Xilinx FPGA
Xilinx
Security analysis
security
Scalability
Resiliency
resilience
real-time systems
pubcrawl
multiscroll chaos based architecture
multi-scroll
Metrics
Mathematical model
low cost image encryption
Image Processing
biometric encryption
Hardware
FPGA
field programmable gate arrays
Euler method
embedded systems
embedded biometric systems
Cryptography
computer architecture
chaotic N × N grid multiscroll system
chaotic communication
chaos-based multiscroll encryption algorithm
chaos
biometrics-based personal authentication systems
biometrics (access control)
biometric templates
biblio
Design of Boolean Chaotic Oscillator Using CMOS Technology for True Random Number Generation
Submitted by grigby1 on Thu, 05/24/2018 - 11:16am
random number generation
message authentication
Metrics
National Institute of Standards and Technology
NI ELVIS platform
Oscillators
pubcrawl
random cryptographic keys
random key generation
Logic gates
random number generators
random numbers
resilience
Resiliency
Ring oscillators
Scalability
security keys
45nm CMOS technology
Inverters
Human behavior
Generators
delays
data transmission security
Cryptography
CMOS integrated circuits
CMOS Boolean Chaotic Oscillator Design
CMOS
chaos
Capacitors
Cadence Virtuoso tool
cadence virtuoso
authentication security
application specific integrated circuits
biblio
Hidden attractor dynamics of a novel non-equilibrium fractional-order chaotic system and its synchronisation control
Submitted by grigby1 on Wed, 02/21/2018 - 12:45pm
Policy-Governed Secure Collaboration
non-equilibrium
nonequilibrium FOCS
nonequilibrium fractional-order chaotic system
nonlinear control
nonlinear control systems
numerical analysis
numerical simulation
Orbits
phase portraits
Policy
Metrics
pubcrawl
resilience
Resiliency
Scalability
Sensitivity
synchronisation
synchronisation control
Synchronization
Trajectory
fractal Lyapunov dimension
bifurcation analysis
bifurcation parameter
chaos
chaos based cryptology
coding information
collaboration
composability
Cryptography
cryptology
encoding
bifurcation
fractional-order chaotic system
fractional-order hidden strange attractor
hidden attractor
hidden attractor dynamics
Human behavior
human factor
Lyapunov methods
maximum likelihood estimation
maximum Lyapunov exponent spectrum
biblio
Chaotic Searchable Encryption for Mobile Cloud Storage
Submitted by K_Hooper on Wed, 02/14/2018 - 11:09am
chaos
cloud
Cloud Computing
composability
encryption
Keyword search
locality sensitive hashing
Mobile communication
pubcrawl
Resiliency
searchable encryption
security
biblio
A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
patient treatment
hybrid real-time cryptography algorithm
innovative technology
lightweight wearable medical devices
Medical services
medical treatment
Metrics
patient confidentiality
patient monitoring
Human behavior
privacy
pubcrawl
real-time health monitoring
remote health monitoring system
Resiliency
secure cryptography algorithm
smart wearable medical devices
Data protection
bioinformatics
biomedical equipment
chaos
Cloud Computing
cloud-based healthcare service protection
computerised monitoring
contemporary health care management
Cryptography
Algorithm design and analysis
deterministic chaos method
DNA
DNA cryptography
genomic encryptions
genomics
health activities
health care
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »