Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
chaotic system
biblio
High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT Network
Submitted by grigby1 on Mon, 06/06/2022 - 11:10am
Internet of Things
security
pubcrawl
Resiliency
wireless sensor networks
sensors
chaotic communication
Compositionality
simulation
Sensitivity
cognitive radio
spectrum sensing
chaotic system
compressive sensing
Information Reuse
biblio
A Noise-Free Homomorphic Encryption based on Chaotic System
Submitted by aekwall on Mon, 02/01/2021 - 10:35am
noise-free homomorphic encryption
EMORE algorithm
encryption-decryption time
enhanced matrix operation
FHE
floating-point number
homomorphism property
modular arithmetic operation
Noise Free
noise-free algorithm
EMORE
outsourced data computing
positive randomness properties
reliable cloud computing environment
reliable encryption
research topics
secure Cloud computing environment
secure encryption
symmetric algorithm
Correlation
Scalability
Cryptography
encrypted data
encryption
data privacy
Resiliency
pubcrawl
Metrics
Reliability
Cloud Computing
fully homomorphic encryption
Security analysis
Human Factors
Homomorphic encryption
outsourcing
chaotic system
Sensitivity
Symmetric matrices
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by grigby1 on Fri, 01/22/2021 - 12:51pm
encryption
traditional cryptography algorithms
symmetric encryption
symmetric cipher
stream cipher
Salsa20
pseudorandom keys
NIST suite
NIST
lightweight cryptography
information technology
Information systems
hybrid modified lightweight algorithm
generated sequence keys
chaotic cryptography
data communication
cryptography algorithms PRESENT
Cryptography
Constrained Devices
computational complexity
Classification algorithms
Ciphers
cipher algorithm
chaotic system
chaotic communication
block ciphers
2D logistic map
pubcrawl
biblio
A Hybrid Modified Lightweight Algorithm Combined of Two Cryptography Algorithms PRESENT and Salsa20 Using Chaotic System
Submitted by aekwall on Tue, 09/08/2020 - 9:12am
chaotic system
traditional cryptography algorithms
symmetric encryption
symmetric cipher
Salsa20
pseudorandom keys
NIST suite
hybrid modified lightweight algorithm
generated sequence keys
cryptography algorithms PRESENT
cipher algorithm
block ciphers
2D logistic map
lightweight cryptography
data communication
chaotic cryptography
Cryptography
chaotic communication
Predictive Metrics
information technology
stream cipher
Ciphers
Constrained Devices
Information systems
computational complexity
NIST
composability
pubcrawl
Resiliency
Classification algorithms
encryption
biblio
Generalized Chaos Synchronization Circuit Simulation and Asymmetric Image Encryption
Submitted by aekwall on Mon, 08/10/2020 - 9:50am
numerical calculations
image colour analysis
image correlation
information interaction
key sensitivity
keyspace
Lyapunov methods
Metrics
multimedia safe communications
Multisim software
network images
nonlinear equations
nonsymmetric identity authentication
numerical analysis
Human behavior
numerical simulation
pubcrawl
quadratic variables
Resiliency
RGB digital image secure communication scheme
statistical analysis
statistical average
structural circuits
synchronisation
Synchronization
synchronous circuits
Trajectory
unpredictable synchronization state
diffeomorphism function
asymmetric image
bifurcation
chaos
chaotic communication
chaotic system
circuit simulation
Color image
complex dynamic behavior
Compositionality
confidential information
conventional chaos systems
conventional drive system
Cryptography
Asymmetric Encryption
differential attack
digital image
digital images
encryption
encryption algorithm
flexible control parameters
four-dimensional diffeomorphism function
four-dimensional nonlinear dynamic equation
GCS response system
generalized chaos synchronization circuit simulation
generalized chaos synchronization theory
generalized response system
Generalized synchronization
biblio
An Image Encryption Method Based on Elliptic Curve Elgamal Encryption and Chaotic Systems
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
elliptic curve ElGamal encryption
chaotic theory
Chosen-plaintext attack
cipher image
crossover permutation
diffusion combined chaos game
DNA sequence
EC-ElGamal
elliptic curve ElGamal cryptography
chaotic index sequence
generated scrambled image
image secure communications
key management problems
novel asymmetric image encryption method
plain-image
potential security problem
SHA-512 hash
symmetric image encryption schemes
Elliptic curves
encryption
Resiliency
Human behavior
pubcrawl
Metrics
DNA
public key cryptography
Elliptic curve cryptography
Cryptography
chaos
chaotic communication
Compositionality
chaotic system
image sequences
Asymmetric Encryption
chaos game
biblio
Biomedical Image Encryption Based on Fractional Discrete Cosine Transform with Singular Value Decomposition and Chaotic System
Submitted by grigby1 on Fri, 07/03/2020 - 3:55pm
fractional Fourier
singular value decomposition
pubcrawl
optical chaos
Metrics
medical image processing
medical image encryption
Medical diagnostic imaging
Logistics
image sequences
Image coding
FrDCT
biomedical image encryption
fractional discrete cosine transform
Fourier transforms
encryption
discrete cosine transforms
different medical images
decryption
decomposition
cyber physical systems
Cryptography
Compositionality
chaotic system
biblio
A Delayed Feedback Chaotic Encryption Algorithm Based on Polar Codes
Submitted by aekwall on Mon, 11/25/2019 - 1:10pm
channel coding
polar codes
physical layer security
encoding information protection
delayed feedback chaotic encryption algorithm
delayed feedback
data transmission security
chaotic sequences
binary keys extraction
chaotic cryptography
cryptanalysis
chaotic system
wireless channels
security of data
chaotic communication
chaos
Predictive Metrics
Reliability
feedback
Wireless communication
Communication system security
composability
pubcrawl
Resiliency
encryption
Cryptography
biblio
Cryptanalysis of an Enhanced Sub-image Encryption Method
Submitted by aekwall on Mon, 11/25/2019 - 1:08pm
Resiliency
pubcrawl
composability
Predictive Metrics
chaotic system
image encryption
chosen plaintext attack
cryptanalysis
chaotic cryptography
biblio
An Image Encryption Scheme Based on Fractal Interpolation
Submitted by aekwall on Mon, 11/25/2019 - 1:08pm
chaotic cryptography
chaotic system
composability
Diffusion
fractal interpolation
image encryption
permuation
Predictive Metrics
pubcrawl
Resiliency
1
2
next ›
last »