Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption system
biblio
Dynamic Iris-Based Key Generation Scheme during Iris Authentication Process
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
key generation
encryption system
Dynamic Key
random key generation
Resiliency
Iris
biometrics
randomness
Image color analysis
Mathematics
encryption
resilience
NIST
authentication
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
Cloud Computing
biblio
AuthentiCAN: a Protocol for Improved Security over CAN
Submitted by aekwall on Mon, 01/25/2021 - 12:52pm
different ECUs
encryption system
actual data sources
added security features
authetication methods
called AuthentiCAN
CAN-FD
car manufacturers
compromised devices
continuous progress
data-unit transfer
destination ECUs
improved security
efficient networks
electronic equipments
fast protocols
latest infotainment technologies
malicious frames
modern cars work
reliable networks
simple networks
synergic manner
user interactions
vehicular protocol
Metrics
computer network security
data confidentiality
encryption
Receivers
Cryptographic Protocols
Protocols
Resiliency
Human behavior
pubcrawl
composability
vehicular ad hoc networks
road safety
authentication
Public key
security risk
sensor data
actuators
controller area network
actuator
actuator security
controller area networks
electronic control units
mobile phones
biblio
Speech encryption based on the synchronization of fractional-order chaotic maps
Submitted by aekwall on Tue, 09/08/2020 - 10:13am
chaotic cryptography
speech encryption
speech communication
key generation mechanism
input speech signal
Fractional-order chaotic systems
fractional-order chaotic map
exact synchronization
encryption system
encryption function
encrypting decrypting speech
Deadbeat observer
chaotic key matrix
chaotic key generator
speech processing
Chaotic systems
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Ciphers
Correlation
Robustness
matrix algebra
Synchronization
synchronisation
composability
pubcrawl
Resiliency
encryption
biblio
IoT Securing System Using Fuzzy Commitment for DCT-Based Fingerprint Recognition
Submitted by grigby1 on Fri, 03/22/2019 - 12:36pm
Fingerprint recognition
Servers
Scalability
Resiliency
resilience
pubcrawl
Metrics
IoT security
IoT securing system
IoT features
Internet of Things
fuzzy set theory
fuzzy commitment scheme
fuzzy commitment
FRR criteria
authentication
fingerprint identification
feature extraction
FAR criteria
error-corrector codes
encryption system
encryption
discrete cosine transforms
DCT-based recognition method
DCT-based fingerprint recognition
DCT
Databases
Cryptography
computer network security
biometric encryption
biblio
Integrated methods of information security in telecommunication systems
Submitted by grigby1 on Wed, 12/20/2017 - 12:59pm
Redundancy
encoding
encryption processes
encryption system
gaming
gamma sequence
generic polynomials
integrated information transformation method
noise-immune coding
dynamical chaos generators
restricted access information
stealth
telecommunication system
timer coding
timer signal construction
unauthorized access
verification elements
signal processing security
chaos
pubcrawl
Resiliency
privacy
information security
encryption
composability
Cryptography
Generators
Metrics
chaos generators
computer networks
cryptographic strength
cryptographic transformations
cyclic codes
data encryption
dynamic chaos sequence