Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
efficient encryption
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
An Efficient Image Encryption Using Chaos Theory
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
Image coding
turmoil hypothesis
section astute rearranging
Resiliency
resilience
push savvy rearranging
pubcrawl
pixel substitution
pixel shuffling
pixel replacement
pixel rearranging
Indexes
image encryption
bit-XOR activity
Entropy
encryption
efficient encryption
disorder hypothesis
decryption
cyber-physical systems
Cryptography
control systems
Conferences
composability
chaos theory
chaos
biblio
Memory Efficient High-Performance Rotational Image Encryption
Submitted by grigby1 on Fri, 06/26/2020 - 12:44pm
real-time systems
optimisation
optimization
optimizations
parallel architectures
parallel rotational encryption technique
pubcrawl
Random access memory
real-time applications
memory efficient high-performance rotational image encryption
resilience
Resiliency
rotated encrypted images
rotational image encryption technique
shadow image
storage management
visual cryptography
gpu
composability
compute unified device architecture
Conferences
Cryptography
CUDA
cyber-physical systems
efficient encryption
encryption
coalesce
graphics processing units
high-performance
high-performance device
high-performance reformulations
Image Processing
improved global memory utilization
Instruction sets
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
Proxy Re-Encryption using MLBC (Modified Lattice Based Cryptography)
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
encrypted message
efficient encryption
secure proxy re-encryption
Re-encryption time
public key encryption
Proxy re-encryption
proxy key generation time
Modified Lattice Based Cryptography
MLBC
minimal trust proxy
maximum key privacy
Cryptography
efficient proxy re-encryption
cyber-physical systems
resilience
Resiliency
composability
pubcrawl
public key cryptography
data privacy
security
biblio
Database Security with AES Encryption, Elliptic Curve Encryption and Signature
Submitted by aekwall on Mon, 04/20/2020 - 10:44am
Metrics
elements level encryption
Elliptic curve cryptography
elliptic curve encryption
encryption
Human behavior
information security
integrity
key generator
keys store
malicious threats
element level encryption
PQC
pubcrawl
public key cryptography
relational database security
relational databases
Resiliency
rows level encryption
secure method
word length 256.0 bit
word length 521.0 bit
database information
AES 256 bits random key
AES encryption
collective measures
column level encryption
columns level encryption
composability
confidential data
confidentiality
cryptography techniques
data stores
efficient encryption
database management software
database management systems
Database Security
database signature security
Database systems
digital signatures
ECC encryption
ECC Signature
electronic signatures
biblio
An Efficient Multi-User Searchable Encryption Scheme without Query Transformation over Outsourced Encrypted Data
Submitted by grigby1 on Tue, 01/07/2020 - 10:55am
repeated encryption
multiuser searchable encryption scheme
outsourced encrypted data
outsourcing
PS
pubcrawl
Public key
query processing
query transformation
multiple owners
resilience
Resiliency
SE schemes
search operation
secure proxy server approach
Servers
user queries
cyber physical systems
attribute-based encryption
authorisation
Broadcast Encryption
Cloud Computing
cloud data
composability
Cryptography
Cyber Physical System
abe
data privacy
document handling
efficient encryption
encryption
Euclidean distance
existing SE approaches
Indexes
biblio
An Efficient SAT-Attack Algorithm Against Logic Encryption
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
information science
Superluminescent diodes
SAT-attack algorithm
SAT
Resiliency
resilience
pubcrawl
logic IP protection
Logic gates
logic encryption
integrated circuits
Benchmark testing
encryption
encrypted circuits
efficient encryption
decryption
cyber physical systems
Cyber Physical System
Cryptography
computability
composability
biblio
An Efficient Framework for Big Data Security Based on Selection Encryption on Amazonec2
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
encryption
unimportant portion
Toss-A-Coin method
Selective Encryption
selection encryption
security framework
Resiliency
resilience
pubcrawl
ordinary encryption methods
Indexes
encryption time
encryption method
Amazon EC2
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
computer science
composability
Cloud Computing
cloud
Ciphers
big data security
Big Data
biblio
Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
encrypted files
secure data sharing
Resiliency
resilience
re-encryption keys
Public key
pubcrawl
Proxy re-encryption
protecting sensitive files
key-aggregate proxy re-encryption scheme
Key-Aggregate Cryptosystem
key-aggregate approach
encryption
Access Control
efficient key-aggregate proxy re-encryption
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
conditional proxy re-encryption schemes
computer science
composability
cloud servers
Cloud Computing
authorisation
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »