Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
chaos
biblio
Lightweight Stream Ciphers based on Chaos for Time and Energy Constrained IoT Applications
Submitted by aekwall on Fri, 03/03/2023 - 10:58am
Ciphers
Lightweight Ciphers
energy con-strained devices
chaotic stream ciphers
chaos
lightweight cryptography
Costs
smart cards
cyber-physical systems
security
Resiliency
Scalability
pubcrawl
Wireless communication
performance evaluation
Internet of Things
wireless sensor networks
biblio
Security-enhanced Key Distribution Based on Chaos Synchronization Between Dual Path-injected Semiconductor Lasers
Submitted by grigby1 on Fri, 09/16/2022 - 4:55pm
security
pubcrawl
Metrics
Correlation
composability
chaos
Delay effects
Synchronization
forward error correction
chaos synchronization
Resiliency
Key Distribution
external injection
semiconductor laser
semiconductor lasers
biblio
Laminar chaos in systems with variable delay time
Submitted by aekwall on Fri, 07/29/2022 - 4:33pm
Metrics
time-varying delay
time-delay system
Synchronization
Resiliency
pubcrawl
privacy
oscillating behaviors
modulation
chaos
laminar chaos
Graphics
delays
Delay effects
Couplings
composability
complex networks
biblio
Eligibility Analysis of Different Chaotic Systems Derived from Logistic Map for Design of Cryptographic Components
Submitted by grigby1 on Tue, 07/12/2022 - 3:24pm
computer science
substitution box
policy governance
logistic map
cryptology
Hash functions
chaos
Compositionality
Proposals
Metrics
Cryptography
composability
Entropy
Generators
Resiliency
resilience
pubcrawl
collaboration
encryption
biblio
A Random Selection Based Substitution-box Structure Dataset for Cryptology Applications
Submitted by grigby1 on Tue, 07/12/2022 - 3:22pm
side-channel attacks
substitution box
random selection
policy governance
cryptology
Resistance
chaos
Compositionality
Metrics
Ciphers
composability
Block Cipher
Generators
Conferences
Resiliency
resilience
pubcrawl
collaboration
biblio
Chaos-Based Interleave Division Multiple Access Scheme with Physical Layer Security
Submitted by grigby1 on Thu, 06/30/2022 - 5:06pm
physical layer security
pubcrawl
Resiliency
composability
Metrics
channel coding
chaos
chaos modulation
chaotic cryptography
Frequency modulation
IDMA
modulation
numerical simulation
resilience
Scalability
security
biblio
Multi image cross hybrid encryption method based on combined chaotic system
Submitted by grigby1 on Thu, 06/30/2022 - 5:05pm
encryption
Logistics
security
pubcrawl
resilience
Resiliency
Scalability
Metrics
chaos
smart cities
chaotic cryptography
combined chaotic system
cross mixing
encryption method
multiple images
biblio
Study on An Alternate-Channel Chaotic Laser Secure Communication System and Shifting Secret Keys to Enhance Security
Submitted by grigby1 on Thu, 06/30/2022 - 4:59pm
signal processing
pubcrawl
resilience
Resiliency
Scalability
chaotic communication
encoding
Metrics
Decoding
chaos
Lasers
chaotic cryptography
Communication Systems
Optics
Secure
laser
biblio
Chaos-based Cryptography Using an Underactuated Synchronizer
Submitted by grigby1 on Fri, 05/20/2022 - 4:31pm
pubcrawl
Conferences
composability
chaotic communication
Compositionality
chaos
Synchronization
encryption
Sensitivity
Communications technology
Costs
Industry applications
Liu system
Lyapunov analysis
secure communication
theoretical cryptography
biblio
Image encryption algorithm using DNA pseudo-symbols and chaotic map
Submitted by grigby1 on Fri, 05/06/2022 - 10:34am
human computer interaction
DNA symbols sequence
DNA pseudo-symbols
chaos game representation of the symbols
chaotic map
DNA cryptography
image encryption
Robot kinematics
DNA
statistical analysis
pubcrawl
resilience
chaos
Metrics
Games
encoding
privacy
Resiliency
Human behavior
1
2
3
4
5
6
7
8
next ›
last »