Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Encryption technique
biblio
Encryption, File Splitting and File compression Techniques for Data Security in virtualized environment
Submitted by grigby1 on Fri, 04/01/2022 - 12:16pm
Software algorithms
steganography algorithm
Pressure
Decryption Technique
data storage
cloud data
Compression
Secure File Sharing
integrity
Data protection
Steganography
Distributed databases
Encryption technique
Cloud Computing
Decoding
Metrics
encoding
composability
Safety
AES
Resiliency
resilience
Human behavior
pubcrawl
security
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by grigby1 on Fri, 01/22/2021 - 12:52pm
internet
Transmitters
time series
telecommunication channels
Receivers
public communication channel
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
Lyapunov-based adaptive technique
Lyapunov methods
chaotic cryptography
Encryption technique
Cryptography
crypto-analysis methods
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
pubcrawl
biblio
RAD: Reinforcement Authentication DYMO Protocol for MANET
Submitted by aekwall on Tue, 05/26/2020 - 10:04am
demand protocol
Secret key
Compositionality
Encryption technique
mobility management (mobile radio)
malicious node
MANET security
authentication technique
average throughput
cryptographic operations
mobile ad hoc network
DYMO
dynamic MANET
infrastructure centralized server
MD5
Message Digest 5
RAD
reinforcement authentication DYMO protocol
Reinforcement.
Routing protocols
telecommunication security
Cryptographic Protocols
learning (artificial intelligence)
Resiliency
pubcrawl
Routing
Metrics
Reinforcement learning
authentication
encryption
message authentication
packet delivery ratio
telecommunication computing
delays
MANET
mobile ad hoc networks
Throughput
end to end delay
biblio
Encryption Algorithm Based on Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 1:43pm
decryption
Neural Network Security
unsecure network
unauthenticated users
Soft Computing
public key cryptography
network communication
Encryption technique
encryption algorithm
decryption techniques
confidential data
Communication Network
auto associative neural network
Biological neural networks
Ciphers
Receivers
Metrics
neural nets
network security
sensitive data
security
computer network security
collaboration
policy-based governance
pubcrawl
encryption
Cryptography
biblio
A Simultaneous Approach for Compression and Encryption Techniques Using Deoxyribonucleic Acid
Submitted by aekwall on Mon, 03/16/2020 - 9:42am
channel medium
time consumption
standard compression techniques
simultaneous technique
simultaneous compression
simultaneous approach
sequential technique
scientific concepts
DNA nucleotides
different scientific studies
deoxyribonucleic acid
creative skill
Compression
compacted information
compact form
Cryptography
secret data
Encryption technique
Scientific Computing Security
Compositionality
Predictive Metrics
resilience
Data Transmission
DNA
Image coding
data compression
pubcrawl
security
encryption
biblio
Chaos-based Cryptography for Transmitting Multimedia Data over Public Channels
Submitted by aekwall on Mon, 11/25/2019 - 1:09pm
Lyapunov-based adaptive technique
Transmitters
time series
telecommunication channels
Resiliency
Receivers
public communication channel
pubcrawl
Predictive Metrics
Oscillators
network security
multiple chaotic orbits
multimedia signals
multimedia data
Multimedia communication
chaotic cryptography
Lyapunov methods
internet
Encryption technique
Cryptography
crypto-analysis methods
composability
Communication channels
chaotic nonautonomous Duffing oscillator
chaotic communication
chaos-based cryptography
chaos
bandwidth allocation
adaptive signal processing
8-bit ASCII code
biblio
Privacy Preserving in TPA for Secure Cloud by Using Encryption Technique
Submitted by grigby1 on Wed, 11/14/2018 - 12:13pm
secure cloud
privacy identification
privacy preserving
Protocols
pubcrawl
public auditing
public verifiers
resilience
Resiliency
Metrics
Secure storage
Servers
shared data
software/hardware error
Task Analysis
TPA
VerifyProof
data services
auditing task
Cloud Computing
cloud data
Compositionality
Cryptography
data holders
data integrity
data privacy
auditing
EAP
encryption
encryption audits
Encryption technique
extensible authentication protocol
human error
liberated encryption standard
biblio
Chaos based Combined Multiple Recursive KEY Generator for Crypto-Systems
Submitted by grigby1 on Wed, 12/27/2017 - 11:56am
cryptosystems
Resiliency
pubcrawl
Plain Text
Metrics
Internet usage
Internet security
internet
information security
Generators
Encryption technique
encryption
Decryption Technique
chaos
Cryptography
composability
communication channel threats
combined multiple recursive generator
CMRG
Ciphers
cipher text
chaotic cryptography
chaotic communication
chaos theory
Chaos Function
chaos based combined multiple recursive KEY generator