Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
ECC algorithm
biblio
Establishing Authenticity for DICOM images using ECC algorithm
Submitted by grigby1 on Tue, 03/09/2021 - 2:05pm
medical image processing
telemedicine
tampered data
signature verification
security
Scalability
Resiliency
resilience
pubcrawl
privacy
patient records
MRI brain images
Metrics
Medical services
medical related image files
medical information systems
authenticity
medical image files
Medical diagnostic imaging
magnetic resonance imaging
image watermarking
Human behavior
Electronic Medical Records (EMR)
ECDSA algorithm
ECDSA
ECC algorithm
digital signatures
DICOM images
DICOM
data privacy
BIOS
biomedical MRI
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
least significant bit
weak security
unsecured operating systems
uncompensatory loss
tampering counterfeiting
suboptimal multimedia applications
Steganography
Smart Systems
Signal processing algorithms
Scalability
Resiliency
Receivers
public key cryptography
pubcrawl
Metrics
LSB watermarking
banking applications
information security
information cloning
image watermarking
image enhancement
Hill cipher algorithm
Hill Cipher
Elliptic curve cryptography
ECC algorithm
discrete cosine transforms
discrete cosine transform
DCT coefficients
Data Security
Cryptography
Ciphertext
Ciphers
biblio
The Cryptocurrency Simulation using Elliptic Curve Cryptography Algorithm in Mining Process from Normal, Failed, and Fake Bitcoin Transactions
Submitted by grigby1 on Fri, 09/04/2020 - 2:59pm
ECC algorithm
transaction process
total processing time
time 6.0 s
time 152.0 s
securing transactions
scenario
RSA processing time
RSA algorithm
normal bitcoin transactions
mining process
high-level security
fake bitcoin transactions
Elliptic Curve Cryptography algorithm
Elliptic curve cryptography (ECC)
efficient processing time
Scalability
cryptography algorithms
cryptocurrency transaction
cryptocurrency simulation
Cryptocurrency security
appropriate algorithm
transaction processing
bitcoin security
bitcoin
cryptocurrency
security level
Human behavior
pubcrawl
public key cryptography
digital signatures
Cryptography
biblio
Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm
Submitted by grigby1 on Wed, 06/20/2018 - 11:39am
mobile ad hoc networks
WSN
wireless sensor networks
virtual node
telecommunication security
selective flooding technique
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Optimized Link State Routing protocol
OLSR protocol
OLSR
network layer attacks
attack prevention
Metrics
MANET routing protocol
MANET
formal routing
Fictitious Node Mechanism
Elliptic curve cryptography
ECC algorithm
DoS attacks
DoS
denial of service attack
Denial Contradictions
DCFM
Compositionality
biblio
Secure key management scheme based on ECC algorithm for patient's medical information in healthcare system
Submitted by BrandonB on Wed, 05/06/2015 - 12:45pm
medical information systems
wireless sensor networks
Wireless body area networks
WBAN
sensors
secure key management scheme
secure communication
public key cryptography
patient medical information protection
message authentication
Medical services
authenticated message exchange
key management
healthcare system
healthcare security
health care
Elliptic curves
Elliptic curve cryptography
ECC algorithm
body area sensor network security
body area networks