Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
secure data transmission
biblio
Design and Implementation of Secure and Encoded Data Transmission Using Turbo Codes
Submitted by aekwall on Mon, 06/15/2020 - 10:01am
Maximum log-map algorithm
Viterbi algorithm
Turbo Encoder
Turbo Decoder
turbo codes
text encoding
text decoding
telecommunication security
Shannonlimit
secure data transmission
Resiliency
Recursive systematic convolutional encoder
pubcrawl
parity check codes
noisy data
Metrics
channel capacity
Maximum likelihood decoding
iterative decoding
Interleaver
image encoding
image decoding
Image coding
forward error correction method
forward error correction
error detection
error correction codes
encoded data transmission
deinterleaver
Decoding
Convolutional codes
composability
biblio
Efficient Route Identification Method for Secure Packets Transfer in MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:03am
regular node mobility
mobile nodes
MANET security
efficient route identification method
fundamental system convenience
malicious nodes
MANET routing Methods
mobile ad hoc network routing
novel secure routing method
Power demand
route discovery process
route selection
route topology
routing table
routing table info
routing technique
secure packets transfer
secured route identification
telecommunication network routing
telecommunication security
security
remote system
Resiliency
pubcrawl
Routing
trusted nodes
Metrics
Conferences
network topology
Topology
secure data transmission
MANET
mobile ad hoc networks
telecommunication network topology
energy consumption
Compositionality
biblio
Research on End-to-End Security Authentication Protocol of NB-IoT for Smart Grid Based on Physical Unclonable Function
Submitted by aekwall on Mon, 02/17/2020 - 1:17pm
domestic cryptographic algorithm
smart power utilization
SM3
self-controllable NB-IoT application layer security architecture
security authentication protocol
secure data transmission
power network data transmission
power grid business platforms
Physical Unclonable Function
NB-IoT terminals
national strategic hot spot
narrow band internet of things
end-to-end security authentication protocol
electric power business
Scalability
end-to-end security
encryption keys
power engineering computing
Smart Grid
smart grid security
message authentication
smart power grids
Metrics
privacy
pubcrawl
Resiliency
Cryptographic Protocols
Internet of Things
biblio
Node-to-Node Secure Data Transmission Protocol for Low-power IoT Devices
Submitted by aekwall on Mon, 05/20/2019 - 9:02am
local networks
transmission protocol
Symmetric Key Cryptography
secure data transmission
Resiliency
public key cryptography
pubcrawl
Protocols
node-to-node secure data transmission protocol
Node to node data transmission
Metrics
message authentication
low-power IoT devices
low-power devices
authentication
Kerberos
IoT devices exchange data
IoT
Internet of Things
internet
Human behavior
encryption
decryption
data communication
Cryptographic Protocols
computer network security
authorisation
biblio
Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy
Submitted by grigby1 on Wed, 01/16/2019 - 1:31pm
transport protocols
wearables security
unauthorized wearable devices
transport layer security handshake protocol
TLS handshake protocol
session key
sensitive data
secure data transmission
Prototypes
mobile authentication proxy
handshake protocol
Data collection
authentication protocol
application server
Wearable Device
proxy
authorisation
Servers
Cryptography
Cryptographic Protocols
performance evaluation
message authentication
telecommunication security
Protocols
Scalability
Resiliency
Human behavior
pubcrawl
authentication
biblio
Search for secure data transmission in MANET: A review
Submitted by grigby1 on Wed, 06/20/2018 - 11:27am
Peer-to-peer computing
versatile node
transmission range
security mechanisms
secure data transmission
Routing protocols
routimg protocols
Resiliency
resilience
pubcrawl
Protocols
privacy
portable nodes
Compositionality
multihop network
mobile nodes
mobile ad-hoc network
mobile ad hoc networks
Metrics
MANET
intermediate node
independent ambulant nodes
highly dynamic network
Cryptography
cryptographic techniques
cryptographic technique
biblio
A high speed implementation counter mode cryptography using hardware parallelism
Submitted by grigby1 on Thu, 04/20/2017 - 11:41am
parallel computing
hardware parallelism
Heracles toolkit
high speed implementation counter mode cryptography
network-on-chip
network on chip
Network on Chip(NoC)
network on chip security
NoC
graphics processing units
pubcrawl
Resiliency
Scalability
secure data transmission
security mechanisms
Software algorithms
unsecured networks
DES
Big Data
composability
Counter Mode Cryptography (CTR)
CPU
Cryptography
CTR
data encryption standard core
Data Encryption Standard (DES)
Algorithm design and analysis
encryption
field programmable gate arrays
FPGA
FPGA board
gpu
Grafic Process Unite(GPU)
graphics processing unit
biblio
FPGA based hardware implementation of AES Rijndael algorithm for Encryption and Decryption
Submitted by grigby1 on Thu, 04/20/2017 - 11:40am
secure data transmission
Inverse S-Box transformations
network on chip
network on chip security
network security algorithm
pre-calculated look-up tables
precalculated LUT
pubcrawl
Resiliency
Rijndael
Scalability
inverse mix-columns transformations
Table lookup
timing
Verilog-HDL
Virtex-7 XC7VX690T chip
wired digital communication networks
wireless digital communication networks
Xilinx ISE Design Suite-14.7 Tool
Xilinx Virtex-7 FPGA
Xilinx XPower Analyzer
decryption
AES-128
AES-192
AES-256
AES Rijndael algorithm
Algorithm design and analysis
algorithmic functions
Clocks
composability
Cryptography
advanced encryption standard (AES)
encryption
Field Programmable Gate Array (FPGA)
field programmable gate arrays
FPGA based hardware implementation
Galois field multiplications
Galois fields
GF (28)
Hardware Description Language (HDL)
hardware description languages