Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
weak security
biblio
On the Security Properties of Combinatorial All-or-nothing Transforms
Submitted by grigby1 on Fri, 09/01/2023 - 1:22pm
Entropy
weak security
conditional entropy
combinatorial all-or-nothing transform
Human Factors
Transforms
perfect security
Probability distribution
information theoretic security
Upper bound
Compositionality
composability
collaboration
Cryptography
Scalability
Resiliency
resilience
policy-based governance
Metrics
Human behavior
pubcrawl
security
information security
biblio
Combined Cryptography and Steganography for Enhanced Security in Suboptimal Images
Submitted by aekwall on Mon, 02/15/2021 - 3:55pm
least significant bit
weak security
unsecured operating systems
uncompensatory loss
tampering counterfeiting
suboptimal multimedia applications
Steganography
Smart Systems
Signal processing algorithms
Scalability
Resiliency
Receivers
public key cryptography
pubcrawl
Metrics
LSB watermarking
banking applications
information security
information cloning
image watermarking
image enhancement
Hill cipher algorithm
Hill Cipher
Elliptic curve cryptography
ECC algorithm
discrete cosine transforms
discrete cosine transform
DCT coefficients
Data Security
Cryptography
Ciphertext
Ciphers
biblio
A Secure Network Coding System Against Wiretap Attacks
Submitted by grigby1 on Mon, 04/06/2020 - 1:23pm
passive attacks
wiretap attacks
wiretap attack
wireless networks
wired networks
weak security
secure network coding system architecture
Routing
Resiliency
resilience
Receivers
random network coding system
random codes
pubcrawl
communication confidentiality
network performance metrics
network links
network coding
Metrics
Hash functions
encoding
eavesdropper
deterministic network coding system
cyber security
cyber physical systems
Cryptography
composability