Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic communication
biblio
Chaotic Constellation Masking Encryption Method for Security-enhanced CO-OFDM/OQAM System
Submitted by grigby1 on Thu, 06/30/2022 - 3:59pm
encryption
pubcrawl
resilience
Resiliency
Scalability
chaotic communication
Data Security
Metrics
simulation
Photonics
chaotic cryptography
Asia
biblio
Study on An Alternate-Channel Chaotic Laser Secure Communication System and Shifting Secret Keys to Enhance Security
Submitted by grigby1 on Thu, 06/30/2022 - 3:59pm
signal processing
pubcrawl
resilience
Resiliency
Scalability
chaotic communication
encoding
Metrics
Decoding
chaos
Lasers
chaotic cryptography
Communication Systems
Optics
Secure
laser
biblio
High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network
Submitted by grigby1 on Mon, 06/06/2022 - 11:10am
Internet of Things
security
pubcrawl
Resiliency
wireless sensor networks
sensors
chaotic communication
Compositionality
simulation
Sensitivity
cognitive radio
spectrum sensing
chaotic system
compressive sensing
Information Reuse
biblio
Chaos-based Cryptography Using an Underactuated Synchronizer
Submitted by grigby1 on Fri, 05/20/2022 - 3:31pm
pubcrawl
Conferences
composability
chaotic communication
Compositionality
chaos
Synchronization
encryption
Sensitivity
Communications technology
Costs
Industry applications
Liu system
Lyapunov analysis
secure communication
theoretical cryptography
biblio
An Implicit Approach for Visual Data: Compression Encryption via Singular Value Decomposition, Multiple Chaos and Beta Function
Submitted by grigby1 on Mon, 03/14/2022 - 11:23am
Metrics
singular value decomposition
logistic map
Compression
Beta Function
Arnold cat map
digital images
Image coding
visualization
Reliability
encryption
Policy Based Governance
Safe Coding
Cats
chaotic communication
Resiliency
resilience
Human Factors
Human behavior
pubcrawl
biblio
Communication System Based on Chaotic Time-Delayed Feedback Generator
Submitted by grigby1 on Thu, 02/10/2022 - 1:08pm
Transmitters
Receivers
Generators
Correlation
Communication Systems
chaotic communication
chaotic carrier
broadband signals
biblio
Multi-Core Implementation of Chaotic RGB-LSB Steganography Technique
Submitted by grigby1 on Thu, 09/30/2021 - 10:08am
Metrics
chaos
chaotic communication
chaotic map
encryption
Image color analysis
Instruction sets
Logistics
LSB steganography
security
multicore computing security
NIST suite
OpenMP
Performance measurement
pubcrawl
resilience
Resiliency
Scalability
biblio
On the Information Leakage in Private Information Retrieval Systems
Submitted by grigby1 on Thu, 04/08/2021 - 4:10pm
chaotic communication
total leakage
private information retrieval systems
PIR systems
individual message leakage
common randomness
coding schemes
information forensics
Information Leakage
encryption
information retrieval
security
privacy
Scalability
data privacy
Indexes
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
internet
Transmitters
time series
telecommunication channels
Receivers
public communication channel
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
Lyapunov-based adaptive technique
Lyapunov methods
chaotic cryptography
Encryption technique
Cryptography
crypto-analysis methods
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
pubcrawl
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
military radio
wireless mobile communication
voice encryption
voice data security
voice communication
trunked radio
telecommunication technology
telecommunication security
security systems
Receivers
multiple circular chaotic permutation
multiple circular
multicircular permutations
chaotic cryptography
GSM network
GSM
Global System for Mobile
end-to-end voice encryption
encryption
dynamic keys
Cryptography
chaotic communication
chaotic algorithm
cellular technologies
cellular radio
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »