Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic protection
biblio
Security Domain for the Sensor Nodes with Strong Authentication
Submitted by aekwall on Mon, 12/07/2020 - 12:24pm
security domain
military communication
mobile radio
neural style transfer
Predictive Metrics
processing power
pubcrawl
Resiliency
Scalability
military applications
security in IoT
sensor node resources
sensory data
tpm
Trusted Platform Module
trusted platform modules
Wireless communication
wireless sensor networks
Data protection
authorisation
composability
cooperating mobile sensor nodes
cryptographic protection
Cryptography
cyber-physical system security
data exchange
data link layer
authentication
data source authentication
data transmission security
domain member
energy resources
Internet of Things
IoT solutions
Logic gates
biblio
Selective Jpeg2000 Encryption of Iris Data: Protecting Sample Data vs. Normalised Texture
Submitted by grigby1 on Fri, 08/28/2020 - 3:44pm
Iris recognition
selective jpeg2000 encryption
Selective Encryption
normalised texture data
low complexity selective encryption schemes
JPEG2000 compressed iris data
JPEG2000
Iris sample protection
cryptographic protection
biometric system security
biometric encryption
Cryptography
data compression
Image coding
image texture
image segmentation
resilience
biometrics (access control)
Scalability
Resiliency
Metrics
pubcrawl
biblio
Security techniques for the WSN link layer within military IoT
Submitted by grigby1 on Mon, 11/13/2017 - 11:59am
Resiliency
WSN link layer
wireless sensor networks
trusted platform modules
Trusted Platform Module
telecommunication security
sensor nodes
security techniques
security
composability
pubcrawl
military communication
military applications
Internet of Things
fault tolerant sensor network
energy resources
Cryptography
cryptographic protection