Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
voice communication
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by grigby1 on Fri, 01/22/2021 - 1:52pm
military radio
wireless mobile communication
voice encryption
voice data security
voice communication
trunked radio
telecommunication technology
telecommunication security
security systems
Receivers
multiple circular chaotic permutation
multiple circular
multicircular permutations
chaotic cryptography
GSM network
GSM
Global System for Mobile
end-to-end voice encryption
encryption
dynamic keys
Cryptography
chaotic communication
chaotic algorithm
cellular technologies
cellular radio
pubcrawl
biblio
Acoustic Fingerprints for Access Management in Ad-Hoc Sensor Networks
Submitted by grigby1 on Wed, 01/20/2021 - 4:07pm
Robustness
microphones
multiple devices
performance evaluation
pubcrawl
resilience
Resiliency
robust generation
robust pairing
intuitive interaction
speech processing
unauthorized devices
user interfaces
users
voice communication
Voice User Interface
voice user interfaces
wireless sensor networks
audio quality
Acoustic Fingerprints
acoustic scenery
Acoustic signal processing
Acoustics
Ad hoc networks
ad-hoc sensor networks
audio fingerprint
Audio fingerprinting
access management system
audio signal processing
authentication
composability
context based authentication
Cryptography
distributed voice user interface
fuzzy cryptography yields
Human behavior
biblio
End-to-End Voice Encryption Based on Multiple Circular Chaotic Permutation
Submitted by aekwall on Tue, 09/08/2020 - 10:13am
chaotic algorithm
wireless mobile communication
voice encryption
voice data security
trunked radio
telecommunication technology
security systems
multiple circular chaotic permutation
multiple circular
multicircular permutations
military radio
GSM network
Global System for Mobile
end-to-end voice encryption
dynamic keys
Cryptography
cellular technologies
voice communication
chaotic cryptography
chaotic communication
Predictive Metrics
GSM
cellular radio
composability
pubcrawl
Resiliency
telecommunication security
Receivers
encryption
biblio
A Secure Voice Channel using Chaotic Cryptography Algorithm
Submitted by aekwall on Mon, 11/25/2019 - 2:09pm
secure voice channel
communicaiton channel prototype
decryption process
encrypted channel
encryption process
encryption-decription cycle
FPGA Spartan-3
high processing speed
nonecrypted channel
Cipher feedback mode
secure voice communications channel
secured channel
secured communication channel
Spartan-3 FPGA board
time 202.0 mus
unwanted eavesdropping
voice communication
voice messages
Ciphers
Cryptography
encryption
Receivers
telecommunication security
eavesdropping
Resiliency
pubcrawl
composability
field programmable gate arrays
Predictive Metrics
chaotic communication
asynchronous communication
chaotic cryptographic algorithm
chaotic cryptography
chaotic cryptography algorithm
chiper feedback