Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
data secrecy
biblio
A DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem
Submitted by grigby1 on Mon, 04/02/2018 - 12:49pm
public key cryptography
finite values
fixed sized chunk
Human behavior
Metrics
Paillier
Paillier cryptosystems
plaintext
pubcrawl
equivalent binary value
random processes
random strings
Receivers
resilience
Resiliency
RSA
Transforms
asymmetric cryptosystem
equivalent ASCII values
encryption
encoding
ElGamal cryptosystems
ElGamal
dynamic DNA encoding
DNA cryptography
DNA cryptographic technique
DNA bases
DNA
data secrecy
Compositionality
Ciphertext
biocomputing
Asymmetric Encryption
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks