Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
receiver side
biblio
Chaotic secure digital communication scheme using auxiliary systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
inclusion technique
transmitter side
transmitter parameters
telecommunication security
security
secure message transmission scheme
Resiliency
Receivers
receiver side
radio transmitters
radio receivers
pubcrawl
Observers
observer
modified Henon hyperchaotic discrete-time system
Metrics
auxiliary chaotic systems
hyperchaotic discrete primary chaotic systems
encryption function
encryption
encrypted message
dynamical left inversion technique
discrete time systems
digital signal processing
digital communication
Cryptography
composability
chaotic synchronization
chaotic secure digital communication scheme
chaotic cryptography
chaotic communication
Auxiliary transmitters
biblio
"Video Streaming Using Dual-Channel Dual-Path Routing to Prevent Packet Copy Attack"
Submitted by grigby1 on Tue, 02/14/2017 - 12:40pm
transport layer
packet copy attack prevention
pubcrawl170102
receiver side
Routing
Routing protocols
scrambled frame pixels
scrambling
sender side
optimistic refined approach
video buffer
video coding
video encryption
video merging
video reconstruction
video streaming
video transmission
Communications technology
network layer routing protocol
multiple unsecured hops
multi path
multi hop
MATLAB
malicious forwarding logic
IPTV
Image reconstruction
illegally copied video data
dual-channel dual-path routing
dual channel
Cryptography
Conferences
computer network security
computational intelligence
biblio
Secure Mail using Visual Cryptography (SMVC)
Submitted by BrandonB on Tue, 05/05/2015 - 11:51am
OpenPGP
wavelet transforms
wavelet transform
wavelet decomposition
visualization
visual cryptography
transmission medium
SMVC
secure mail using visual cryptography
Receivers
receiver side
receipent mail box
public key cryptography
public key based image authentication method
pretty good privacy
personal security
CFB mode encryption
message authentication
low frequency wavelet coefficient
Internet standards
Image Processing
Heuristic algorithms
gray scale image
encryption
Electronic mail
e-mail messaging
dynamic s-box algorithm
data privacy
chaos-based image encryption algorithm
chaos based image encryption algorithm
chaos