Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
hybrid encryption
biblio
An Efficient Approach to Reduce the Encryption and Decryption Time Based on the Concept of Unique Values
Submitted by grigby1 on Thu, 07/13/2023 - 12:46pm
encryption
privacy
Computer hacking
pubcrawl
resilience
Resiliency
Companies
composability
Elliptic curve cryptography
data analysis
Technological innovation
Informatics
Homomorphic encryption
efficient encryption
hybrid encryption
uniqueness of values
biblio
A Hybrid Encryption Technique based on DNA Cryptography and Steganography
Submitted by grigby1 on Wed, 07/12/2023 - 1:35pm
encryption
pubcrawl
Human behavior
Metrics
resilience
privacy
encoding
Mobile communication
DNA
Steganography
Huffman coding
Resiliency
codes
DNA cryptography
DNA Steganography
hybrid encryption
biblio
An Hybrid Approach to Insure Data Integrity on Outsourced Data using Symmetric Key Cryptography
Submitted by aekwall on Fri, 05/06/2022 - 12:52pm
AES
encryption audits
outsourcing
hybrid encryption
DES
auditing
RSA
data integrity
Cryptography
Predictive Metrics
Reliability
Compositionality
Technological innovation
Resiliency
pubcrawl
encryption
Protocols
data privacy
Cloud Computing
biblio
Multi-Layered CP-ABE Scheme for Flexible Policy Update in Industry 4.0
Submitted by grigby1 on Tue, 04/19/2022 - 4:40pm
CP-ABE
E2E security
embedded computing
Encapsulation
encryption
hybrid encryption
iiot
Industries
Industry 4.0
Middleboxes
policy-based governance
policy update
pubcrawl
Scalability
biblio
An Overview and Analysis of Hybrid Encryption: The Combination of Symmetric Encryption and Asymmetric Encryption
Submitted by aekwall on Mon, 01/10/2022 - 12:46pm
information security
internet
encryption
pubcrawl
Metrics
Human behavior
Elliptic curve cryptography
asymmetric algorithm
data science
encryption algorithm
hybrid encryption
information processing
symmetric algorithm
Asymmetric Encryption
Resiliency
Compositionality
biblio
IPlock: An Effective Hybrid Encryption for Neuromorphic Systems IP Core Protection
Submitted by grigby1 on Wed, 08/11/2021 - 3:25pm
pubcrawl
policy-based governance
collaboration
resilience
Resiliency
composability
hybrid encryption
ECC
ip protection
SM4
IP core protection
neuromorphic systems
biblio
Implementation of Two Factor Authentication (2FA) and Hybrid Encryption to Reduce the Impact of Account Theft on Android-Based Instant Messaging (IM) Applications
Submitted by grigby1 on Thu, 01/28/2021 - 1:31pm
QR Code (4)
Instant messaging
Instant messaging (1)
instant messaging application security
message decryption process
message security
Metrics
pubcrawl
public key cryptography
implementation designs
QR code implementation
RSA 2048
Scalability
security
Servers
two factor authentication
two-factor authentication
Two-factor authentication (3)
Electronic mail
resilience
Resiliency
account theft
AES 128
android
android encryption
authentication
confidential messages
QR codes
electronic messaging
encryption
end-to-end encryption
Fingerprint (5)
Fingerprint recognition
Human behavior
hybrid encryption
Hybrid Encryption (2)
biblio
Security Improvement of Cloud Data Using Hybrid Cryptography and Steganography
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
hashing functions
Steganography
cloud data
security issue
asymmetric cryptography
Asymmetric Encryption
AES symmetric encryption
compressed data
data encryption phase
data validation phase
symmetric cryptography
information concealment technology
LSB algorithm
LZW algorithm
mixed encryption
RSA asymmetric encryption
SHA hashing algorithm
Steganographic
strong data security
data compression
encrypted data
encryption
hybrid encryption
cloud storage
Resiliency
Human behavior
pubcrawl
composability
Metrics
Cloud Computing
public key cryptography
security improvement
Image coding
information technology
cloud environment
Software algorithms
Image Processing
data storage
biblio
A Hybrid Solution for Confidential Data Transfer Using PKI, Modified AES Algorithm and Image as a Secret Key
Submitted by aekwall on Mon, 01/25/2021 - 12:58pm
PKI
symmetric encryption technologies
secure transfer
modified AES algorithm
key generation server
insecure network
confidential information trading
confidential information leakage
confidential data transfer
asymmetric encryption technologies
Asymmetric Encryption
online services
modified AES
sensitive information
digital signatures
Servers
cyber threats
public key cryptography
Public key
internet
Metrics
composability
pubcrawl
Human behavior
Resiliency
data encryption
data integrity
Receivers
hybrid encryption
encryption
biblio
Construction of Big Data Hyperchaotic Mixed Encryption Model for Mobile Network Privacy
Submitted by aekwall on Mon, 08/24/2020 - 1:50pm
chaotic communication
big data privacy
steganography performance
Rossle chaotic mapping
Privacy big data
piecewise linear combination method
mobile network privacy big data hybrid encryption algorithm
mobile network big data
mobile network
mixed network information sharing
mixed encrypted public key
Hyperchaos
hybrid encryption
big data hyperchaotic mixed encryption model
Steganography
piecewise linear techniques
Scalability
encoding
Ciphers
Human Factors
public key cryptography
mobile radio
Metrics
pubcrawl
Resiliency
Protocols
Cryptographic Protocols
data privacy
Big Data
encryption
authorisation
1
2
next ›
last »