Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Chebyshev approximation
biblio
Wideband Hybrid Acoustic-Electromagnetic Filters with Prescribed Chebyshev Functions
Submitted by grigby1 on Wed, 12/07/2022 - 5:39pm
BAW
acoustic filters
Resonator filters
Chebyshev approximation
Acoustics
Microwave theory and techniques
Resonant frequency
Prototypes
Scalability
Resiliency
acoustic coupling
Microwave filters
Coupling Matrix
resilience
Human behavior
pubcrawl
biblio
Study on Statistical Analysis Method of Decoy-state Quantum Key Distribution with Finite-length Data
Submitted by grigby1 on Tue, 08/31/2021 - 12:10pm
Chebyshev approximation
finite-length data
Fluctuations
Human behavior
Metrics
Photonics
pubcrawl
Quantum Key Distribution
random key generation
Random variables
resilience
Resiliency
Scalability
security
security performance
statistical analysis
biblio
Improvement of PRIME Protocol Based on Chaotic Cryptography
Submitted by grigby1 on Fri, 01/22/2021 - 1:51pm
AES algorithm
AES encryption algorithm
carrier transmission on power lines
chaotic cryptography
Chebyshev approximation
Cryptographic Protocols
encryption
key expansion process
narrowband power line communication protocol
Power line communications
PRIME protocol
Protocols
pubcrawl
biblio
Improvement of PRIME Protocol Based on Chaotic Cryptography
Submitted by aekwall on Tue, 09/08/2020 - 10:12am
encryption
Cryptographic Protocols
Protocols
Resiliency
pubcrawl
composability
Predictive Metrics
chaotic cryptography
AES algorithm
carrier transmission on power lines
Power line communications
AES encryption algorithm
Chebyshev approximation
key expansion process
narrowband power line communication protocol
PRIME protocol
biblio
A Partial Ligt-weight Image Encryption Scheme
Submitted by grigby1 on Fri, 06/26/2020 - 12:43pm
pubcrawl
information security
Internet of Things
Internet of Things applications
lifting wavelet transform
light-weight encryption solution
machine type communications
multichaos computational efficient encryption
Multimedia encryption
partial ligt-weight image encryption scheme
plaintext image
image security
real-time application requirements
resilience
Resiliency
sensitive multimedia data
sensors
transformed image
virtual reality
virtual reality technologies
wavelet transforms
Electrical Engineering
chaos
chaotic communication
Chebyshev approximation
Chebyshew map
composability
Cryptography
cyber-physical systems
digital images
efficient encryption
augmented reality technologies
encryption
encryption algorithms
encryption schemes
Entropy
faster data speed
fifth generation technology
greater network capacity
high quality multimedia data
Image Processing
biblio
Document Typist Identification by Classification Metrics Applying Keystroke Dynamics Under Unidealised Conditions
Submitted by grigby1 on Tue, 01/28/2020 - 2:36pm
keystroke analysis
Typist identification
text detection
text analysis
rhythm
pubcrawl
password
Minkowski metric
Minkowski distance
Metrics
Measurement
keystroke dynamics
Chebyshev approximation
Keyboards
image classification
Human Factors
Human behavior
feature extraction
document typist identification
document image processing
Distance metrics
Databases
classification metrics
biblio
Quantum color image encryption based on multiple discrete chaotic systems
Submitted by grigby1 on Wed, 12/27/2017 - 1:09pm
logistic Chebyshev map
XOR operation
statistical attacks
Resiliency
quantum image encryption algorithm
quantum encryption algorithm
quantum cryptography
quantum controlled-NOT image
quantum color image encryption
pubcrawl
multiple discrete chaotic systems
Metrics
Logistics
Algorithm design and analysis
image colour analysis
Histograms
encryption process
encryption
differential attacks
composability
Color
Chebyshev approximation
chaotic logistic map
chaotic cryptography
chaos
asymmetric tent map
biblio
ID-Based Signcryption Scheme Using Extended Chaotic Maps
Submitted by grigby1 on Wed, 12/27/2017 - 12:56pm
cryptosystems
security superiorities
Resiliency
public-key cryptography
public key cryptography
pubcrawl
Metrics
identity-based signcryption scheme
Identity-based signcryption
ID-based signcryption scheme
extended chaotic maps
encryption
ECM-IBSC scheme
Algorithm design and analysis
Computation efficiency
computation efficiencies
composability
Chebyshev approximation
chaotic public-key cryptography
Chaotic maps
chaotic cryptography
chaotic communication
chaos-based discrete logarithm problem
chaos
CDL problem