Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
symmetric
biblio
A survey on Symmetric and Asymmetric Key based Image Encryption
Submitted by aekwall on Mon, 01/25/2021 - 11:56am
Asymmetric Encryption
technological advancements especially wireless sensor network
symmetric
image encryption techniques
image destruction
era security
encryption approaches
encryption algorithms
different transfer mediums
cipher text
asymmetric key
Asymmetric
Cryptography
decryption
Image Processing
authenticity
Image coding
Metrics
wireless sensor networks
composability
pubcrawl
Human behavior
Resiliency
encryption
biblio
On Secrecy Key of a class of Secure Asymmetric Multilevel Diversity Coding System
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
secrecy key size
Asymmetric
Codecs
exact secure rate region
Gaussian processes
key size
key size characterization
multilevel diversity coding
multilevel diversity coding systems
S-AMDCS
5G wireless networks
secure asymmetric MDCS
secure asymmetric multilevel diversity coding system
source-separate coding
superposition secure rate region
symmetric
wiretap channel
wiretap channels
wiretapped messages
Cryptography
pubcrawl
Metrics
resilience
Resiliency
private key cryptography
telecommunication security
security
data privacy
Internet of Things
5G mobile communication
Big Data
Compositionality
Communication networks
secrecy
linear codes
network coding
coding theory
biblio
Privacy-Preserving Authentication Protocol based on Hybrid Cryptography for VANETs
Submitted by aekwall on Mon, 02/24/2020 - 9:56am
pseudonyms
symmetric cryptography
public key infrastructure
Asymmetric
hybrid
Hybrid Cryptography
OBU
privacy-preservation
privacy-preserving authentication protocol
computational overhead
RSU
symmetric
symmetric key encryption
TA
VANET communication
vehicles
Repudiation
security
VANET
public key cryptography
attacks
authentication
Metrics
vehicular ad hoc networks
privacy
composability
pubcrawl
Human behavior
Resiliency
Protocols
Cryptographic Protocols
telecommunication security
Cryptography