Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
DNA cryptography
biblio
Secured Outsourcing towards a Cloud Computing Environment Based on DNA Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
intensive data computing
trust
storage
security solution
security schema
security
secured outsourcing
Resiliency
resilience
pubcrawl
protection
private data
privacy
outsourcing
Metrics
Internet service
Cloud Computing
integrity
Human behavior
encryption
encoding
DNA cryptography
DNA
data center
Cryptography
confidentiality
completely secure migration
cloud service providers
cloud provider
cloud computing technology
cloud computing paradigm
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
biblio
Multi-Level of DNA Encryption Technique Based on DNA Arithmetic and Biological Operations
Submitted by grigby1 on Tue, 01/07/2020 - 9:50am
Metrics
encryption
Generators
Hadamard matrices
Hadamard matrix
Human behavior
internet
Knight Tour
Knight tour movement
dynamic key generation
privacy
pubcrawl
random DNA sequence
randomness
resilience
Resiliency
secret data transformation
attack operations
DNA reference nucleotides locations
DNA Gen Bank reference
DNA encryption technique
DNA encryption algorithm
DNA cryptography
DNA arithmetic
DNA
deoxyribonucleic acid
Cryptography
Ciphers
Blum Blum Shub generator
biological operations
bioinformatics
BBS-DNA sequence
BBS generator
biblio
A Dynamic DNA for Key-Based Cryptography
Submitted by grigby1 on Tue, 01/07/2020 - 9:50am
geographical cryptography
traditional cryptographic approaches
text file
Resiliency
resilience
Reliability
Receivers
quantum cryptography
pubcrawl
privacy
plain text characters
Metrics
key-based cryptography
image file
Human behavior
audio file
encryption
encoding
effective cryptographic systems
dynamic DNA
DNA sequences
DNA digital coding
DNA cryptography
DNA
decryption
Cryptography
Ciphers
biometrics (access control)
biometric cryptography
biocomputing
biblio
Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules
Submitted by aekwall on Mon, 04/29/2019 - 8:50am
DNA cryptography
BIOS Security
Cyber-Bio Security
DNA
Human behavior
Identity Based Signatures
Metrics
pubcrawl
Reed-Solomon codes
Resiliency
Scalability
biblio
An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based Cryptography
Submitted by grigby1 on Thu, 02/14/2019 - 10:13am
Ciphers
composability
Compositionality
computer security
decryption
DNA
DNA cryptography
encoding
encryption
Enhanced polyalphabetic Cipher algorithm
pubcrawl
theoretical cryptography
Vigenere cipher
biblio
A DNA Cryptographic Technique Based on Dynamic DNA Encoding and Asymmetric Cryptosystem
Submitted by grigby1 on Mon, 04/02/2018 - 11:49am
public key cryptography
finite values
fixed sized chunk
Human behavior
Metrics
Paillier
Paillier cryptosystems
plaintext
pubcrawl
equivalent binary value
random processes
random strings
Receivers
resilience
Resiliency
RSA
Transforms
asymmetric cryptosystem
equivalent ASCII values
encryption
encoding
ElGamal cryptosystems
ElGamal
dynamic DNA encoding
DNA cryptography
DNA cryptographic technique
DNA bases
DNA
data secrecy
Compositionality
Ciphertext
biocomputing
Asymmetric Encryption
biblio
A New Cryptography Algorithm to Protect Cloud-Based Healthcare Services
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
patient treatment
hybrid real-time cryptography algorithm
innovative technology
lightweight wearable medical devices
Medical services
medical treatment
Metrics
patient confidentiality
patient monitoring
Human behavior
privacy
pubcrawl
real-time health monitoring
remote health monitoring system
Resiliency
secure cryptography algorithm
smart wearable medical devices
Data protection
bioinformatics
biomedical equipment
chaos
Cloud Computing
cloud-based healthcare service protection
computerised monitoring
contemporary health care management
Cryptography
Algorithm design and analysis
deterministic chaos method
DNA
DNA cryptography
genomic encryptions
genomics
health activities
health care
biblio
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
Human behavior
triangular scrambling method
triangular scrambling
transmitted image
transmission channel
subkeys
Resiliency
pubcrawl
privacy
Metrics
man in the middle attack
image encryption
Image coding
hybrid encryption image mechanism
chaos
encryption
eavesdropping attack
DNA sequences
DNA encoding
DNA cryptography
DNA
Cryptography
Correlation
computer science
color image encryption
Ciphers
Chaotic maps
biblio
Privacy-preserving pattern matching over encrypted genetic data in cloud computing
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
genomics
testing
secure DNA sequence matching problem
Resiliency
regular clinical laboratory tests
pubcrawl
privacy-preserving pattern matching
privacy guarantee
privacy
personalized medicine
personal genomics services
pattern matching
Metrics
Human behavior
health care model
health care
biology computing
genome matching problem
Genetics
encryption
encrypted genetic data
DNA information
DNA data privacy
DNA data
DNA cryptography
DNA
diseases
data privacy
Cryptography
Computational modeling
Cloud Computing
« first
‹ previous
1
2
3
4
5
6
next ›
last »