Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Chaotic maps
biblio
Comparison of Cryptography by Chaotic Neural Network and by AES
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
AES cipher
AES ciphering
chaos
chaotic cryptography
Chaotic maps
chaotic neural network approach
chaotic neural networks
Cryptography
neural nets
pubcrawl
short plaintexts
text encryption
biblio
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve (DCBI-IEC) for Crypto Images
Submitted by aekwall on Mon, 01/18/2021 - 10:21am
Elliptic curve cryptography
user fingerprint image
statistical analysis
Resiliency
public key cryptography
pubcrawl
key sensitivity test
image encryption application
image encryption
IEC
high security level
fingerprint minutia data
fingerprint identification
feature extraction
encryption
Elliptic curves
biometric encryption
Dynamic Chaotic Biometric Identity Isomorphic Elliptic Curve
differential analysis
decryption processing
DCBI-IEC system
Chaotic maps
chaotic logistic map
chaotic cryptography
chaotic communication
chaos
biometrics (access control)
biometric identity
biometric digital identity
Metrics
Scalability
resilience
biblio
Comparison of Cryptography by Chaotic Neural Network and by AES
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
Cryptography
Resiliency
pubcrawl
composability
neural nets
Predictive Metrics
chaos
chaotic cryptography
Chaotic maps
AES cipher
AES ciphering
chaotic neural network approach
chaotic neural networks
short plaintexts
text encryption
biblio
Image Encryption Based on Quantum-Assisted DNA Coded System
Submitted by grigby1 on Tue, 01/07/2020 - 9:51am
quantum
Image Processing
information security
information stockpiling
Metrics
Predictive Metrics
privacy
Protocols
pubcrawl
image encryption
quantum channel
quantum cryptography
quantum-assisted DNA coded system
resilience
Resiliency
traditional encryption plans
unauthorised client
DNA cryptography
2D logistic maps
BB84 protocol
biocomputing
chaotic communication
Chaotic maps
Ciphers
Correlation
DNA
1D logistic maps
DNA encoding
DNA subtraction
encrypted image DNA decoding
encryption
Entropy
Histograms
Human behavior
biblio
Secure speech communication system based on scrambling and masking by chaotic maps
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
chaotic encryption
two encryption levels
SSSNR
speech processing
signal denoising
secure speech communication system
scrambling
public channels
MatLab simulation
masking
communication security
Chaotic systems
chaotic scrambling and masking
chaotic scrambling
chaotic masking
Chaotic maps
Cryptography
channel problems
Transmitters
chaotic cryptography
chaotic communication
Predictive Metrics
Synchronization
synchronisation
composability
pubcrawl
Resiliency
information security
telecommunication security
Receivers
encryption
biblio
Color image encryption using chaotic maps, triangular scrambling, with DNA sequences
Submitted by grigby1 on Tue, 01/23/2018 - 1:54pm
Human behavior
triangular scrambling method
triangular scrambling
transmitted image
transmission channel
subkeys
Resiliency
pubcrawl
privacy
Metrics
man in the middle attack
image encryption
Image coding
hybrid encryption image mechanism
chaos
encryption
eavesdropping attack
DNA sequences
DNA encoding
DNA cryptography
DNA
Cryptography
Correlation
computer science
color image encryption
Ciphers
Chaotic maps
biblio
Reversible Chaotic Encryption Techniques For Images
Submitted by grigby1 on Wed, 12/27/2017 - 12:09pm
Image Processing
UACI
tent map
Signal processing algorithms
signal processing
reversible chaotic encryption technique
Resiliency
pubcrawl
PSNR
pixel shuffling
NPCR
MSE
Metrics
Logistics
logistic map
Arnold cat map
image pixels
image encryption security
image encryption
encryption
Cryptography
composability
civilian systems
Chaotic techniques
Chaotic maps
chaotic cryptography
chaotic communication
Cats
Arnold's cat map
biblio
ID-Based Signcryption Scheme Using Extended Chaotic Maps
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
cryptosystems
security superiorities
Resiliency
public-key cryptography
public key cryptography
pubcrawl
Metrics
identity-based signcryption scheme
Identity-based signcryption
ID-based signcryption scheme
extended chaotic maps
encryption
ECM-IBSC scheme
Algorithm design and analysis
Computation efficiency
computation efficiencies
composability
Chebyshev approximation
chaotic public-key cryptography
Chaotic maps
chaotic cryptography
chaotic communication
chaos-based discrete logarithm problem
chaos
CDL problem