Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Cryptography
biblio
A State-Of-Art Model of Encrypting Medical Image Using DNA Cryptography and Hybrid Chaos Map - 2d Zaslavaski Map: Review
Submitted by grigby1 on Fri, 04/14/2023 - 4:01pm
Medical Image
telemedicine
Smart healthcare
security
Scalability
Resiliency
resilience
pubcrawl
Metrics
DNA cryptography
Medical diagnosis
encryption
DNA
Cryptography
chaotic map
chaotic cryptography
chaotic communication
biblio
Advanced Encryption Standard Algorithm with Optimal S-box and Automated Key Generation
Submitted by grigby1 on Fri, 03/31/2023 - 11:25am
delays
Throughput
Resiliency
resilience
Random access memory
Metrics
Lookup Table (LUT)
Heuristic algorithms
encryption
-AES
Data Security
Cryptography
computer architecture
Ciphertext
biometrics (access control)
pubcrawl
biometric encryption
biblio
Improved Homomorphically Encrypted Biometric Identification Using Coefficient Packing
Submitted by grigby1 on Fri, 03/31/2023 - 11:25am
biometric encryption
pubcrawl
biometric identification
biometric information protection
computational workload reduction
Costs
Cryptography
dimensionality reduction
face recognition
Forensics
Hardware
Homomorphic encryption
Metrics
Quantization (signal)
resilience
Resiliency
biblio
Vulnerabilities and Threat Management in Relational Database Management Systems
Submitted by grigby1 on Fri, 03/17/2023 - 12:15pm
Cryptography
relational database management systems
Heart
relational database security
Database systems
SQL injection
SQL
computer security
composability
Access Control
encryption
authentication
Safety
Resiliency
resilience
Metrics
Human behavior
pubcrawl
relational databases
biblio
Eavesdropping Against Bidirectional Physical Layer Secret Key Generation in Fiber Communications
Submitted by grigby1 on Fri, 03/17/2023 - 11:36am
pubcrawl
Human behavior
Human Factors
Metrics
Scalability
Cryptography
resilience
physical layer security
eavesdropping
Physical layer
Photonics
optical fiber communication
Resiliency
random key generation
fiber communications
two-way secret key generation
biblio
A Novel Secure Physical Layer Key Generation Method in Connected and Autonomous Vehicles (CAVs)
Submitted by grigby1 on Fri, 03/17/2023 - 11:34am
Robustness
pre-shared key
CAVs
random key generation
Resiliency
Phase shift keying
connected vehicles
Bit error rate
Physical layer
fading channels
security
resilience
VANETs
real-time systems
Cryptography
Scalability
Metrics
Human Factors
Human behavior
pubcrawl
biblio
A Secure mechanism to protect UAV communications
Submitted by grigby1 on Fri, 03/03/2023 - 5:17pm
control systems
kerberos security
UAV Communication Network
Kerberos
Internet security
Internet of drones
uav
distributed systems
Intelligent systems
Access Control
smart cities
Internet of Things
Cryptography
authentication
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
biblio
Cryptographic Data Security for IoT Healthcare in 5G and Beyond Networks
Submitted by grigby1 on Tue, 02/28/2023 - 5:50pm
IoT security
end-to-end
Costs
networks
Healthcare
5G
encryption
edge computing
decryption
composability
Prototypes
Cybersecurity
Internet of Things
Medical services
5G mobile communication
Cryptography
Resiliency
resilience
Metrics
Human behavior
pubcrawl
IoT
security
privacy
biblio
Securing SDN Enabled IoT Scenario Infrastructure of Fog Networks From Attacks
Submitted by grigby1 on Fri, 02/17/2023 - 5:26pm
computer architecture
Servers
pubcrawl
resilience
Resiliency
Software
Scalability
Cryptography
delays
real-time systems
energy consumption
malicious attacks
SDN security
Datagram Transport Layer Security (DTLS)
IoT-Fog networks
software defined networking (SDN)
biblio
A Secure and Practical Sample-then-lock Scheme for Iris Recognition
Submitted by grigby1 on Fri, 02/03/2023 - 5:08pm
pubcrawl
Human behavior
resilience
Resiliency
Scalability
Cryptography
Entropy
Force
Stability analysis
Resists
Pattern recognition
codes
pattern locks
« first
‹ previous
…
3
4
5
6
7
8
9
10
11
…
next ›
last »