Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic communication
biblio
Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks
Submitted by grigby1 on Fri, 09/04/2020 - 3:16pm
pseudo-random number generator (PRNG)
discrete-time chaotic maps
dynamics degradation
fixed point arithmetic
fixed-point arithmetic
floating point arithmetic
floating-point arithmetic
logistic map
Orbits
digital computer
pseudorandom number generators
Quantization (signal)
random number generation
randomness
SMN
state-mapping network
tent map
black box encryption
encryption
complex network
telecommunication security
Generators
pubcrawl
composability
Metrics
Resiliency
resilience
Cryptography
chaos
Degradation
chaotic communication
Logistics
black box
chaotic dynamics
chaotic map
communication securiy
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 12:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
elliptic curve ElGamal encryption
chaotic theory
Chosen-plaintext attack
cipher image
crossover permutation
diffusion combined chaos game
DNA sequence
EC-ElGamal
elliptic curve ElGamal cryptography
chaotic index sequence
generated scrambled image
image secure communications
key management problems
novel asymmetric image encryption method
plain-image
potential security problem
SHA-512 hash
symmetric image encryption schemes
Elliptic curves
encryption
Resiliency
Human behavior
pubcrawl
Metrics
DNA
public key cryptography
Elliptic curve cryptography
Cryptography
chaos
chaotic communication
Compositionality
chaotic system
image sequences
Asymmetric Encryption
chaos game
biblio
Chaos-based Information Rotated Polar Coding Scheme for Visible Light Wiretap Channel
Submitted by aekwall on Mon, 07/13/2020 - 10:17am
polar codes
Visual Light Communications Security
visible light wiretap channel
visible light communication systems
telecommunication security
telecommunication network reliability
security
secure polar coding scheme
Scalability
rotation principle
rotated information
Resiliency
Reliability
pubcrawl
channel coding
Metrics
light polarisation
free-space optical communication
chaotic sequences
chaotic communication
chaos-based information rotated polar coding scheme
chaos
channel polarization
channel conditions
bit-channels
bit-channel identification
composability
biblio
Chaotic based Image Encryption - A Neutral Perspective
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
encryption
Resiliency
resilience
Random sequences
pubcrawl
Neural networks
neural network
neural nets
information entropy analysis
Informatics
image encryption.
image encryption
Image coding
Entropy
encryption algorithm
chaos
encoding
efficient encryption
efficient algorithms
DNA
cyber-physical systems
Cryptography
correlation coefficient analysis
correlation attacks
Correlation
composability
Chaotic generators
chaotic generator
chaotic communication
chaotic based image encryption
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 11:43am
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
A Chaos MIMO-Based Polar Concatenation Code for Secure Channel Coding
Submitted by grigby1 on Mon, 04/06/2020 - 1:23pm
parity check codes
LLR-based turbo code
log-likelihood ratio
low-density parity check code
Maximum likelihood decoding
Metrics
MIMO communication
modulation
modulation coding
network coding
numerical analysis
numerical evaluation
LLR-based outer channel coding
physical layer security
polar code
polar code concatenation
polar codes
pubcrawl
resilience
Resiliency
SCAD
secure channel coding effect
sequential LLR
composability
5G networks
bit error rate performance
block codes
C-MIMO transmission scheme
channel coding
chaos
chaos multiple-input multiple-output-based polar concatenation code
chaos transmission
chaotic communication
chaotic MIMO block modulation
5 G
concatenated codes
convolutional code
Convolutional codes
cyber physical systems
Decoding
error correction ability
error correction codes
error statistics
iterative decoding
LDPC-concatenated transmission
biblio
Chaos-Based Delay-Constrained Green Security Communications for Fog-Enabled Information-Centric Multimedia Network
Submitted by grigby1 on Tue, 01/21/2020 - 10:28am
Information Centric Networks
telecommunication security
Streaming media
Scalability
Resiliency
resilience
Reed-Solomon codes
pubcrawl
network edge capability
multimedia streams
media streaming
internet
chaos-based delay-constrained green security communications
Information Centric Network
ICMN
fog-enabled Information-Centric Multimedia Network
Fog computing
encryption
edge computing
Cryptography
content-centric features
chaotic encryption
chaotic communication
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »