Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Selective Encryption
biblio
Highly Efficient Protection of Biometric Face Samples with Selective JPEG2000 Encryption
Submitted by grigby1 on Tue, 06/14/2022 - 3:13pm
Metrics
Selective Encryption
JPEG 2000
faces in the wild
biometric encryption
Security Evaluation
Transform coding
face recognition
face biometrics
signal processing
encoding
Databases
Scalability
Conferences
Resiliency
resilience
pubcrawl
deep learning
biblio
An efficient selective encryption scheme for HEVC based on hyperchaotic Lorenz system
Submitted by grigby1 on Thu, 05/05/2022 - 3:14pm
Syntactics
efficient encryption
stream cipher
hyperchaotic Lorenz system
syntax elements
high efficiency video coding
high efficency video coding
cyber physical system security framework
cyber physical systems
Selective Encryption
encryption
Random sequences
composability
information technology
Indexes
optimization
Resiliency
resilience
pubcrawl
biblio
Fast HEVC Selective Encryption Scheme Based on Improved CABAC Coding Algorithm
Submitted by grigby1 on Wed, 05/05/2021 - 12:40pm
Interference
syntax elements
Syntactics
Selective Encryption
Safe Coding
Resiliency
resilience
pubcrawl
policy-based governance
Metrics
collaboration
Human Factors
Human behavior
high efficiency video coding
entropy coding
Entropy
encryption
encoding
context-based adaptive binary arithmetic coding
biblio
Enforcing Corporate Governance's Internal Controls and Audit in the Cloud
Submitted by aekwall on Mon, 03/22/2021 - 1:06pm
Compositionality
Self-protection
organizational aspects
internal controls and audit process
Internal Controls and Audit functions
integrity guarantee
ICA functions
corporate governance
cloud-based services
business organizations
privacy guarantee
auditing
encryption audits
Selective Encryption
outsourcing
security of data
Predictive Metrics
business data processing
data privacy
process control
cloud-based solutions
Data protection
pubcrawl
Resiliency
security
Organizations
encryption
data access
Cryptography
Cloud Computing
biblio
Selective Jpeg2000 Encryption of Iris Data: Protecting Sample Data vs. Normalised Texture
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
Iris recognition
selective jpeg2000 encryption
Selective Encryption
normalised texture data
low complexity selective encryption schemes
JPEG2000 compressed iris data
JPEG2000
Iris sample protection
cryptographic protection
biometric system security
biometric encryption
Cryptography
data compression
Image coding
image texture
image segmentation
resilience
biometrics (access control)
Scalability
Resiliency
Metrics
pubcrawl
biblio
Protecting Messages Using Selective Encryption Based ESI Scheme for MANET
Submitted by aekwall on Tue, 05/26/2020 - 11:03am
Selective Encryption
wired networks
reasons MANET
protecting messages
misbehaving node
ESI scheme
encryption scheme
dynamic topology
centralized administrator
ample protection
MANET security
mobile nodes
message passing
telecommunication security
security scheme
Compositionality
mobile ad hoc network
telecommunication network topology
mobile ad hoc networks
MANET
Metrics
Routing protocols
pubcrawl
Resiliency
Cryptographic Protocols
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
open network environment
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
image restoration
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
image segmentation
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
Cryptography
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
biblio
Empowering Owners with Control in Digital Data Markets
Submitted by aekwall on Mon, 01/20/2020 - 11:44am
Distributed databases
smart contracts
smart contract
Selective Encryption
Resiliency
pubcrawl
Predictive Metrics
Key derivation
encryption audits
authorisation
digital data markets
Digital data market
data owner
Cryptographic Protocols
Compositionality
blockchain-based interaction protocol
blockchain
authorized users
biblio
An Efficient Framework for Big Data Security Based on Selection Encryption on Amazonec2
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
encryption
unimportant portion
Toss-A-Coin method
Selective Encryption
selection encryption
security framework
Resiliency
resilience
pubcrawl
ordinary encryption methods
Indexes
encryption time
encryption method
Amazon EC2
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
computer science
composability
Cloud Computing
cloud
Ciphers
big data security
Big Data
biblio
Cross Layer Approach Energy Efficient Transmission of Multimedia Data over Wireless Sensor Networks
Submitted by grigby1 on Tue, 09/19/2017 - 12:21pm
channel coding
composability
cross layer approach
Energy Efficiency
Metrics
processor power
pubcrawl
Resiliency
Selective Encryption
video coding
Wireless sensor networks: H.264 compression
1
2
next ›
last »