Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
information transmission
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
cover image
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
public key cryptography
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
Scalability
Public key
encryption
digital signatures
message authentication
Image color analysis
Image coding
pubcrawl
Resiliency
network security
information security
Receivers
private key cryptography
decryption
Cryptography
digital signature
biblio
Re-joining of authorized nodes in MANETs using EGSR scheme and detection of internal attacks using 2ACK scheme
Submitted by grigby1 on Wed, 06/20/2018 - 11:31am
resilience
Organizations
packet drop
Peer-to-peer computing
Protocols
pubcrawl
Quality metrics
Re-Routing
rejoining processing
Reliable Path
mobile computing
Resiliency
root nodes
Routing
Routing Protocol
Routing protocols
telecommunication channels
telecommunication network management
telecommunication security
wireless infrastructureless network
GroupKeyManagement
ad hoc environment
Ad hoc networks
Attack detection
authorized nodes
Compositionality
delays
dropped packets
EGSR schemes
group capacity
2ACK scheme
Hybrid based PSO
information transmission
internal attacks
MANET
MANETs
Metrics
mobile ad hoc network
mobile ad hoc networks
biblio
"Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm"
Submitted by grigby1 on Mon, 02/13/2017 - 1:13pm
NIOS II soft core processor
Image coding
image compression
image decryption
image encryption
information transmission
internet
MATLAB
microprocessor chips
network security
field programmable gate arrays
pubcrawl170102
QUARTUS II
scrambling plaintext
SOPC builder tool
standards
system-on-chip
system-on-programmable chip builder tool
W7 key stream generator
data compression
Advanced Encryption Standard (AES) Algorithm
AES encryption algorithm
Algorithm design and analysis
Altera DE2 FPGA board
computer network security
confidential image data protection
Cryptography
Cyclone II EP2C35F672
Cyclone II FPGA
advanced encryption standard
data storage
Data Transmission
digital communication network
digital data exchange cryptography
digital world Internet
discrete wavelet transform
DWT
encryption
biblio
Trust-based QoS routing algorithm for Wireless Sensor Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:44pm
packet transmission
WSN
wireless sensor networks
trust-based QoS routing algorithm
Trust Routing
telecommunication power management
telecommunication network routing
telecommunication control
routing algorithms
Routing
quality of service
QoS
Protocols
power control
Algorithm design and analysis
Packet loss
node clusting
LEACH protocol
LEACH
information transmission
energy efficient
Energy Efficiency
energy control
energy conservation
delays
Data Transmission
data communication
cluster head selection
biblio
Overview on vehicular ad hoc network and its security issues
Submitted by BrandonB on Wed, 05/06/2015 - 7:52am
telecommunication switching
safekeeping
Safety
security
security issues
self-configurable network connectivity
signal-weakening barrier
telecommunication network routing
telecommunication security
Roads
travel comfort
unauthorized message injection
VANET
vehicles
vehicular ad hoc networks
Vehicular ad-hoc networks (VANET)
vehicular communications
wireless links
eavesdropping
attacks
authentication
Availability
Computer crime
confidentiality
Cryptography
data privacy
data trust
active safety enhancement
information exchange
information transmission
message alteration
message routing
non-repudiation
Position based routing
preventive safety enhancement
privacy