Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
pubcrawl170102
biblio
"LP formulations for secrecy over erasure networks with feedback"
Submitted by grigby1 on Tue, 02/14/2017 - 12:47pm
arbitrary network
Automatic repeat request
Complexity theory
Cryptography
encryption
erasure network
feedback
Linear programming
LP formulation
message sending
network coding
polynomial time scheme
pubcrawl170102
secure message transmission
telecommunication channels
telecommunication security
biblio
"Enhanced Cryptcoding: Joint Security and Advanced Dual-Step Quasi-Cyclic LDPC Coding"
Submitted by grigby1 on Tue, 02/14/2017 - 12:45pm
frame-error-rate
tablet
smartphone
SLCC
quasicyclic parity check matrix
pubcrawl170102
power-efficient design
Phase change materials
PCM
parity check codes
low density parity check coding
JSALE
JSALC method
joint security and advanced LDPC-based encryption
joint security and advanced dual-step quasicyclic LDPC coding
high throughput mobile device
advanced encryption system
FER
error statistics
encryption
encoding
dual-step secure LDPC code for channel coding
Data Security
cyclic codes
Cryptography
cryptcoding
Complexity theory
Cloud Computing
channel coding
battery-life
AES-128 security level
biblio
"A project-based multi-disciplinary elective on digital data processing techniques"
Submitted by grigby1 on Tue, 02/14/2017 - 12:43pm
Elliptic curves
undergraduate majors
students feedback
source coding
registration statistics
pubcrawl170102
project-based multidisciplinary elective
project based
polynomials
multi-disciplinary
Internet-of-Things
Image coding
fresh graduates
error correcting codes
encryption
assessment data
Electrical Engineering
educational courses
digital data processing techniques
Data processing
data handling
Cryptography
course outcomes
computer science
Computer Engineering
computer aided instruction
Compression
Cloud Computing
channel coding
Big Data centers
biblio
"Video Streaming Using Dual-Channel Dual-Path Routing to Prevent Packet Copy Attack"
Submitted by grigby1 on Tue, 02/14/2017 - 12:40pm
transport layer
packet copy attack prevention
pubcrawl170102
receiver side
Routing
Routing protocols
scrambled frame pixels
scrambling
sender side
optimistic refined approach
video buffer
video coding
video encryption
video merging
video reconstruction
video streaming
video transmission
Communications technology
network layer routing protocol
multiple unsecured hops
multi path
multi hop
MATLAB
malicious forwarding logic
IPTV
Image reconstruction
illegally copied video data
dual-channel dual-path routing
dual channel
Cryptography
Conferences
computer network security
computational intelligence
biblio
"Hybrid cryptosystem for maintaining image integrity using biometric fingerprint"
Submitted by grigby1 on Tue, 02/14/2017 - 12:35pm
hybrid cryptosystem
user authentication
transmission
secure image transmission
secret fragment visible mosaic image method
pubcrawl170102
PSNR
mosaic image
key generation
image security
image parameter
image lossless compression technique
image integrity
image data integrity
image compression
Image coding
authentication
human being
Fingerprint recognition
encryption purpose
encryption
data hiding encryption
data compression
data communication
Cryptography
confidential information
Compression
biometrics (access control)
biometric fingerprint
Biomedical imaging
authorisation
authentication purpose
biblio
"Algorithm for secure visual communication"
Submitted by grigby1 on Tue, 02/14/2017 - 12:33pm
RC4
XOR operation
video encryption
video data transmission
video data storage space
video data handling
video conference
Video communication
video coding
teleconferencing
telecommunication security
telecommunication network reliability
symmetric hierarchical encryption
Streaming media
Signal processing algorithms
secure visual communication
Ciphers
public channel
pubcrawl170102
privacy
network bandwidth availability
multimedia encryption scheme
Multimedia communication
malicious intervention
lightweight selective encryption algorithm
H.264/AVC
GDH.3
entropy coding
encryption
economic utilization
data privacy
Cryptography
biblio
"Hiding Media Data via Shaders: Enabling Private Sharing in the Clouds"
Submitted by grigby1 on Tue, 02/14/2017 - 12:30pm
GPU Shader
video filter
social networks
social networking (online)
pubcrawl170102
private sharing
privacy
multi-channel chained solutions
media data hiding
Media Data
Media
Markov cipher
image filter
Image coding
Big Data
format-compliant end-to-end privacy-preserving scheme
Format-Compliant
encryption
data privacy
data encapsulation
Cryptography
cloud services
cloud networks
Cloud Computing
cloud
Chaotic Mapping
big media data storage
biblio
"Circuit design to improve security of telecommunication devices"
Submitted by grigby1 on Tue, 02/14/2017 - 12:28pm
military forces
tunneling
TETRA
Telecommunication standards
telecommunication security
telecommunication devices
telecommunication device security
Telecommunication
SusTech
security
radio networks
radio equipment
pubcrawl170102
project 25
5G mobile communication
Iron
GSM
exclusive channel
encryption
economical circuit
Design Circuit
Cryptography
Conferences
coding
circuit design
attackers
Artificial Intelligence
accidental damage
biblio
"Separation of encrypted and compressed image with auxillary information"
Submitted by grigby1 on Tue, 02/14/2017 - 12:25pm
image compression
uncompressed picture scrambling
quantized information
quantization technique
quantisation (signal)
pubcrawl170102
pressure proportion mutilation criteria
picture recreation
packed reproduced scrambled information
Magneto electrical resistivity imaging technique
information pressure
image encryption
auxiliary information
Image coding
helper data
grid computing
encrypted image separation
encoded picture compacting
encoded information
data compression
Cryptography
Compression ratio-distortion performance
compressed image separation
biblio
"A Novel Secure Arithmetic Image Coding Algorithm Based on Two-Dimensional Generalized Logistic Mapping"
Submitted by grigby1 on Tue, 02/14/2017 - 12:21pm
Image coding
two-dimensional generalized logistic mapping
security of data
secure arithmetic image coding algorithm
pubcrawl170102
multimedia data
Logistics
logistic chaotic mapping
image encryption
2D chaotic sequences
encryption
digital image
channel coding
arithmetic coding
arithmetic codes
Algorithm design and analysis
2D generalized logistic mapping
« first
‹ previous
1
2
3
4
next ›
last »