Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
encryption method
biblio
Multi image cross hybrid encryption method based on combined chaotic system
Submitted by grigby1 on Thu, 06/30/2022 - 5:05pm
encryption
Logistics
security
pubcrawl
resilience
Resiliency
Scalability
Metrics
chaos
smart cities
chaotic cryptography
combined chaotic system
cross mixing
encryption method
multiple images
biblio
An Encryption and Decryption Algorithm Based on Random Dynamic Hash and Bits Scrambling
Submitted by aekwall on Mon, 03/29/2021 - 12:06pm
Filling
stream cipher algorithm
stream cipher
Resiliency
Random Dynamic Hash
pubcrawl
Lenses
Heuristic algorithms
hash mapping address
Hash functions
hash algorithms
binary random dynamic hash
Europe
encryption method
encryption
decryption methods
Cryptography
Compositionality
ciphertext space
Ciphers
bits scrambling
biblio
Privacy-Preserving Fuzzy Multi-Keyword Search for Multiple Data Owners in Cloud Computing
Submitted by aekwall on Mon, 09/28/2020 - 12:02pm
locality-sensitive hashing
Computing Theory and Privacy
single data owner model
searchable encryption schemes
search privacy
privacy-preserving fuzzy multikeyword search
plaintext search techniques
multiple data owners
LSH
Information Leakage
fuzzy multi-keyword search.
encrypted documents
ciphertext search
Bloom filter
BF
Cloud Computing
Privacy-preserving
encryption method
cloud server
Indexes
fuzzy set theory
query processing
pubcrawl
Human behavior
Resiliency
data privacy
encryption
Cryptography
Servers
Scalability
biblio
An Efficient Framework for Big Data Security Based on Selection Encryption on Amazonec2
Submitted by grigby1 on Tue, 01/07/2020 - 10:54am
encryption
unimportant portion
Toss-A-Coin method
Selective Encryption
selection encryption
security framework
Resiliency
resilience
pubcrawl
ordinary encryption methods
Indexes
encryption time
encryption method
Amazon EC2
efficient encryption
cyber physical systems
Cyber Physical System
Cryptography
computer science
composability
Cloud Computing
cloud
Ciphers
big data security
Big Data
biblio
Image Steganography Using Combine of Discrete Wavelet Transform and Singular Value Decomposition for More Robustness and Higher Peak Signal Noise Ratio
Submitted by grigby1 on Mon, 08/12/2019 - 3:23pm
image technique discrete wavelet transform
wavelet transforms
Watermarking
Steganography
singular value decomposition performance
singular value decomposition method
Singular Value Decomposition (SVD)
singular value decomposition
Robustness
pubcrawl
Peak Signal Noise Ratio (PSNR)
Metrics
Mean Squared Error (MSE)
mean squared error
Compositionality
Image Steganography
Image coding
higher peak signal noise ratio
frequency-domain analysis
encryption method
discrete wavelet transforms
Discrete Wavelet Transform (DWT)
discrete cosine transforms
discrete cosine transform
decomposition
Cyber Physical System
Cryptography
biblio
An Integrated Model To Make Cloud Authentication And Multi-Tenancy More Secure
Submitted by aekwall on Mon, 05/20/2019 - 10:03am
Kerberos
security protocols
resource management
resource allocation map
resource allocation manager unit
resource allocation
Resiliency
public key cryptography
pubcrawl
Protocols
multitenancy
multi-tenancy
multi-access systems
Metrics
message authentication
Kerberos authentication protocol
Cryptography
integrated model
Human behavior
encryption method
Elliptic curve cryptography
ECC
Databases
Cryptographic Protocols
control database
computer network security
Cloud Security
Cloud Computing
Cloud Authentication
cloud
authentication security
authentication