Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
XOR operation
biblio
An Anti-Attack Trust Mechanism Based on Collaborative Spectrum Sensing for Underwater Acoustic Sensor Networks
Submitted by grigby1 on Thu, 07/08/2021 - 2:01pm
Scalability
XOR operation
Underwater Networks
underwater communication
Underwater acoustics
UAC
trust mechanism
simulation
sensors
security
CUA
Safety
Resists
Resiliency
resilience
pubcrawl
Metrics
faces
Cyber Physical System
biblio
A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
robust scheme
Hyper-chaos
hyper-chaos systems
image encryption
image encryption scheme
image sequences
Metrics
pubcrawl
Resiliency
Histograms
secure Hash algorithm SHA-1
Security analysis
Sensitivity
SHA-1
sub-vectors confusion
two-diffusion process
XOR operation
4D hyperchaotic system
highest security level
Entropy
encryption schemes
encryption process
encryption
digital image encryption
diffusion layers
Diffusion
Cryptography
Correlation
Confusion
composability
chaotic index sequence
chaotic cryptography
chaos
biblio
Quantum color image encryption based on multiple discrete chaotic systems
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
logistic Chebyshev map
XOR operation
statistical attacks
Resiliency
quantum image encryption algorithm
quantum encryption algorithm
quantum cryptography
quantum controlled-NOT image
quantum color image encryption
pubcrawl
multiple discrete chaotic systems
Metrics
Logistics
Algorithm design and analysis
image colour analysis
Histograms
encryption process
encryption
differential attacks
composability
Color
Chebyshev approximation
chaotic logistic map
chaotic cryptography
chaos
asymmetric tent map
biblio
"Algorithm for secure visual communication"
Submitted by grigby1 on Tue, 02/14/2017 - 11:33am
RC4
XOR operation
video encryption
video data transmission
video data storage space
video data handling
video conference
Video communication
video coding
teleconferencing
telecommunication security
telecommunication network reliability
symmetric hierarchical encryption
Streaming media
Signal processing algorithms
secure visual communication
Ciphers
public channel
pubcrawl170102
privacy
network bandwidth availability
multimedia encryption scheme
Multimedia communication
malicious intervention
lightweight selective encryption algorithm
H.264/AVC
GDH.3
entropy coding
encryption
economic utilization
data privacy
Cryptography