Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Secret key
biblio
Mathematical cryptanalysis of \#x201C;personalized information encryption using ECG signals with chaotic functions \#x201D;
Submitted by grigby1 on Wed, 12/27/2017 - 1:08pm
Henon map
text encryption
text analysis
Secret key
Resiliency
pubcrawl
Physics
personalized information encryption
Optics
numerical simulation
Metrics
mathematical cryptanalysis
image data encryption
Heuristic algorithms
Henon mapping
bifurcation
Electrocardiography
electrocardiogram
ECG signals
data encryption algorithm
cryptosystem
Cryptography
cryptanalysis
composability
Chosen-plaintext attack
chaotic system
chaotic functions
chaotic cryptography
chaos
biblio
"HRJ_encryption: An ASCII code based encryption algorithm and its implementation"
Submitted by grigby1 on Tue, 02/14/2017 - 12:10pm
information technology
Secret key
Receivers
public key cryptography
Public key
pubcrawl170102
private key cryptography
private key
Plain Text
personal desktop
Algorithm design and analysis
HRJ_encryption
encryption
decryption
Cloud Computing
cipher text
ASCII code based encryption algorithm
ASCII Code
arrays
biblio
"An edge based image steganography with compression and encryption"
Submitted by grigby1 on Mon, 02/13/2017 - 2:01pm
Image coding
stego image distortion
Steganography
secret message
Secret key
pubcrawl170102
private key cryptography
Optical distortion
Media
MATLAB
LZW algorithm
Image edge detection
ART
Hash Function
encryption
embedded secret data
edge detection
edge based image steganography
data hiding capacity
data encryption
data compression
Cryptography
canny edge detector
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 1:20pm
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
biblio
Using identity and trust with key management for achieving security in Ad hoc Networks
Submitted by BrandonB on Wed, 05/06/2015 - 8:52am
physical identity
wireless channels
trusted communication
trust model
trust factor
telecommunication security
shared wireless channel
Servers
self certification scheme
security
secure data transfer
Secret key
Routing protocols
Public key
Protocols
Ad hoc networks
modified DSR routing protocol
mobile ad hoc networks
mobile ad hoc network
MANET
key management
identity model
experience based trust factor
data secrecy
data integrity
data communication
certificate
central authority
Artificial Neural Networks
« first
‹ previous
1
2
3