Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic cryptography
biblio
Random Number Generator Based on Skew-tent Map and Chaotic Sampling
Submitted by aekwall on Mon, 01/18/2021 - 10:22am
Oscillators
skew-tent map
field programmable analog arrays
field programmable analog array
discrete-time chaos
chaotic sampling of regular waveform
random number generator
Clocks
Trajectory
Scalability
chaotic cryptography
chaotic communication
Throughput
Generators
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Digital Dynamic Chaos-Based Encryption System in a Research Project of the Department of Marine Electronics
Submitted by aekwall on Mon, 01/18/2021 - 10:22am
chaotic cryptography
signal generators
research project
digital dynamic chaos-based encryption system
digital data encryption system
Department of Marine Electronics
chaotic signal generation
computer systems
information
Trajectory
Transmitters
Scalability
chaotic communication
chaos
Mathematical model
Metrics
pubcrawl
Resiliency
encryption
Cryptography
Servers
biblio
Chaotic Constellation Scrambling Method for Security-Enhanced CO-OFDM/OQAM Systems
Submitted by aekwall on Mon, 01/18/2021 - 10:22am
communication system
security-enhanced CO-OFDM-OQAM systems
security-enhanced
offset quadrature amplitude modulation
encryption project
encryption methods
coherent optical OFDM/OQAM
coherent optical OFDM-OQAM system
chaotic cross mapping
chaotic constellation scrambling method
chaotic constellation scrambling (CCS)
BER
OFDM modulation
Scalability
optical communication
encryption scheme
transmitted information
quadrature amplitude modulation
chaotic encryption
chaotic cryptography
error statistics
Bit error rate
Metrics
pubcrawl
Resiliency
Cryptography
biblio
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve (DCBI-IEC) for Crypto Images
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
Elliptic curve cryptography
user fingerprint image
statistical analysis
Resiliency
public key cryptography
pubcrawl
key sensitivity test
image encryption application
image encryption
IEC
high security level
fingerprint minutia data
fingerprint identification
feature extraction
encryption
Elliptic curves
biometric encryption
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve
differential analysis
decryption processing
DCBI-IEC system
Chaotic maps
chaotic logistic map
chaotic cryptography
chaotic communication
chaos
biometrics (access control)
biometric identity
biometric digital identity
Metrics
Scalability
resilience
biblio
A New Four-Dimensional Chaotic System and Its Application in Speech Encryption
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
chaotic communication
chaotic cryptography
Correlation
Cryptography
encryption
four-dimensional chaotic system
key space
low-dimensional chaotic encryption
Metrics
Physics
pubcrawl
Resiliency
Scalability
speech encryption
speech processing
biblio
Encryption of the Images on the Basis of Two Chaotic Systems with the Use of Fuzzy Logic
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
Fuzzy Cryptography
statistical analysis
Scalability
Resiliency
pubcrawl
pseudorandom sequences
Metrics
image encryption system
Image coding
fuzzy logic encryption
Fuzzy logic
security
Entropy
digital cryptography
Cryptography
correlation coefficient
Chaotic systems
Chaotic Mapping
chaotic map
chaotic encryption
chaotic cryptography
chaos
biblio
Improving Chaotic Image Encryption Using Maps with Small Lyapunov Exponents
Submitted by aekwall on Mon, 01/18/2021 - 10:20am
chaotic communication
small Lyapunov exponents
lower bound error
largest Lyapunov exponent
finite precision
chaotic image encryption
chaotic encryption scheme
chaos-based encryption
Shannon entropy
cryptography techniques
Chaotic systems
Lyapunov methods
chaotic cryptography
Scalability
Image Processing
chaos
correlation coefficient
Entropy
Mathematical model
standards
Metrics
pubcrawl
Resiliency
encryption
Cryptography
biblio
Random selective block encryption technique for image cryptography using chaotic cryptography
Submitted by aekwall on Mon, 01/18/2021 - 10:20am
chaotic cryptography
secured image transmission systems
random selective block encryption technique
random data streaming
plaintext attack
plain text imaging
image cryptography
hybrid chaotic map
dynamic random growth technique
data stream generation
chaotic
block-based image encryption
Scalability
permutation
Diffusion
Image Processing
encryption
random processes
Metrics
pubcrawl
Resiliency
decryption
Cryptography
biblio
Synchronization for three chaotic systems with different structures and its application in secure communication
Submitted by aekwall on Tue, 09/08/2020 - 9:13am
encrypted information signal
telecommunication security
synchronized receiver
synchronisation
stability
secure communication
Resiliency
pubcrawl
Predictive Metrics
multistage chaotic synchronized secure communication system
Lyapunov stability theory
Lyapunov methods
adaptive synchronization method
discrete signal
different order chaotic systems
Cryptography
continuous signal
composability
chaotic masking
chaotic cryptography
chaotic communication
chaos synchronization
Chaos encryption
biblio
Speech encryption based on the synchronization of fractional-order chaotic maps
Submitted by aekwall on Tue, 09/08/2020 - 9:13am
chaotic cryptography
speech encryption
speech communication
key generation mechanism
input speech signal
Fractional-order chaotic systems
fractional-order chaotic map
exact synchronization
encryption system
encryption function
encrypting decrypting speech
Deadbeat observer
chaotic key matrix
chaotic key generator
speech processing
Chaotic systems
Cryptography
Histograms
chaotic communication
chaos
Predictive Metrics
Ciphers
Correlation
Robustness
matrix algebra
Synchronization
synchronisation
composability
pubcrawl
Resiliency
encryption
« first
‹ previous
1
2
3
4
5
6
7
8
9
next ›
last »