Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption algorithms
biblio
Secure Biometric Lock System for Files and Applications: A Review
Submitted by aekwall on Tue, 03/09/2021 - 10:55am
fingerprint identification
user access information
Software
security system
secure biometric lock system
Scalability
Resiliency
pubcrawl
multifactor authentication
Metrics
Fingers
Fingerprint recognition
biometric encryption
fingerprint biometric systems
finger recognition
Face
encryption algorithms
Cryptography
biometrics (access control)
biometric system
biometric fingerprint sensor
authorisation
authentication
Access Control
biblio
A survey on Symmetric and Asymmetric Key based Image Encryption
Submitted by aekwall on Mon, 01/25/2021 - 11:56am
Asymmetric Encryption
technological advancements especially wireless sensor network
symmetric
image encryption techniques
image destruction
era security
encryption approaches
encryption algorithms
different transfer mediums
cipher text
asymmetric key
Asymmetric
Cryptography
decryption
Image Processing
authenticity
Image coding
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
encryption
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 11:43am
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
Database Encryption Using Asymmetric Keys: A Case Study
Submitted by grigby1 on Mon, 04/02/2018 - 11:48am
encryption
web applications
test database
RSA
Resiliency
resilience
pubcrawl
padding
Metrics
Java API
Java
internet
Human behavior
encryption-decryption keys
encryption keys
encryption algorithms
application performance decrease
Encrypted database
ElGamal
ECIES
Distributed databases
Databases
database encryption
Data Security
Cryptography
cryptographic algorithms
Compositionality
Benchmark testing
asymmetric keys
Asymmetric Encryption
application program interfaces
biblio
Enhancing data security of iOS client by encryption algorithm
Submitted by K_Hooper on Wed, 02/28/2018 - 10:34am
Human Factors
sensitive data
Resiliency
pubcrawl
mobile devices
Metrics
iOS Security
iOS devices
iOS client
iOS (operating system)
information security
Compositionality
encryption algorithms
EDS
ECC encryption algorithms
ECC
desktop computer
DES encryption algorithm
Data Transmission
Data Security
Cryptography
biblio
A multifactor authentication system using secret splitting in the perspective of Cloud of Things
Submitted by grigby1 on Thu, 02/15/2018 - 10:48am
message authentication
virtualized control
smart cards
Servers
Security analysis
secret splitting
Resiliency
resilience
pubcrawl
multifactor authentication system
multifactor authentication
Metrics
authentication
IoT
Internet of Things
Human Factors
human factor
Human behavior
encryption algorithms
Diffie-Hellman key exchange algorithm
Cryptography
CoT
Cloud of Things
Cloud Computing
biblio
A set-theoretic approach for secure and resilient control of Cyber-Physical Systems subject to false data injection attacks
Submitted by grigby1 on Thu, 12/28/2017 - 12:34pm
Human behavior
telecommunication channels
set-theoretic control framework
set theory
Science of Security
Scalability
resilient control
Resiliency
pubcrawl
Policy-Governed Secure Collaboration
Metrics
internet
Human Factors
actuators
FDI attacks
encryption algorithms
Detectors
cyber-physical systems
cyber false data injection attacks
Cryptography
control remediation strategy
composability
Communication channels
collaboration
anomaly detector module
biblio
A new hybrid encryption technique permuting text and image based on hyperchaotic system
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
HyprChaos
text encryption
Text
Software algorithms
Resiliency
pubcrawl
Niobium
Metrics
Image Processing
image encryption
image
chaos
hyperchaotic system
hybrid encryption technique
hybrid
Generators
encryption algorithms
encryption
Cryptography
composability
Ciphers
chaotic cryptography
biblio
Security vulnerability analysis of design-for-test exploits for asset protection in SoCs
Submitted by grigby1 on Tue, 12/12/2017 - 12:31pm
integrity
test structures
system-on-chips
system-on-chip
SoC integration
Security Policies Analysis
secure microprocessors
secret keys
pubcrawl
policy-based governance
memory read-write functions
Logic gates
IP networks
internal modules
asset protection
information leakage vulnerabilities
encryption algorithms
encryption
Discrete Fourier transforms
design-for-test exploits
design for testability
Cryptography
Controllability
control finite state machines
confidentiality
collaboration
availability policies
automated security vulnerability analysis framework
biblio
An architectural framework for encryption amp; generation of digital signature using DNA cryptography
Submitted by BrandonB on Wed, 05/06/2015 - 10:05am
DNA computing DNA cryptography
Steganography
plaintext size
key size
information security
encryption time
encryption algorithms
encryption
encoding
DNA digital coding
DNA cryptography
architectural framework
DNA computing
DNA
digital signatures
digital signature generation
digital signature encryption
decryption time
cryptanalysis
Ciphers
biocomputing