Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
decryption
biblio
Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function
Submitted by aekwall on Mon, 02/15/2021 - 3:57pm
cryptographic hash functions
cryptographic tasks
decryption
derivation function
Electronic mail
Elliptic curve cryptography
elliptic curve discrete logarithm problem
Elliptic curves
encryption
Generators
hard number theoretic problems
Hash Function
Metrics
NIST
pseudorandom bit generator mechanism
pseudorandom bit generators
pubcrawl
public key cryptography
Random Bit Generator
random bit generator mechanism
random number generation
Resiliency
Scalability
secure hash function
security strengths
statistical testing
unpredictability properties
biblio
DEAVD - Data Encryption and Aggregation using Voronoi Diagram for Wireless Sensor Networks
Submitted by aekwall on Mon, 02/15/2021 - 3:48pm
Aggregation
composability
computational geometry
Cryptographic Protocols
Cryptography
cyber physical systems
data aggregation
data communication
data encryption
DEAVD protocol compresses data
decryption
Decryption Technique
efficient encryption
encryption
energy conservation
energy consumption
energy efficient encryption
environmental monitoring
military surveillance
Protocols
providing security
pubcrawl
Resiliency
secure data exchange
sensed data
Voronoi diagram
voronoi diagram paradigm
wireless sensor networks
biblio
File Encryption and Decryption Using DNA Technology
Submitted by aekwall on Mon, 02/08/2021 - 12:50pm
Cryptography
encryption
Conferences
Receivers
Resiliency
Human behavior
pubcrawl
privacy
DNA
public key cryptography
Predictive Metrics
data hiding
encoding
decryption
DNA cryptography
DNA sequence
appropriate form
arbitrary keys generation
authorized persons
binary-coded form
common key
cryptographic process
data forwarding
data hijacking
data transmutation
deoxyribo nucleic acid sequence
DNA technology
file decryption
file encryption
intermediate steps
original texted message
unknown form
users data security
biblio
Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts
Submitted by aekwall on Mon, 02/08/2021 - 12:46pm
Scalability
digital signature
Cryptography
decryption
private key cryptography
Receivers
information security
network security
Resiliency
pubcrawl
Image coding
Image color analysis
message authentication
digital signatures
encryption
Public key
public key cryptography
Information hiding
Data Transmission
image colour analysis
Steganography
message integrity
private key
Color image
information communication
cover image
encrypted object
information transmission
PSNR
signature image hiding
signature image information
SSIM
stego image
biblio
Fast Decryption Algorithm for Paillier Homomorphic Cryptosystem
Submitted by aekwall on Mon, 02/01/2021 - 10:35am
Algorithm
Cathode ray tubes
Complexity theory
computational cost
Computational efficiency
Cryptography
data privacy
decryption
decryption speed
encrypted data
encryption
fast decryption algorithm
fast decryption process
Homomorphic encryption
Human Factors
improved decryption process
Metrics
modular multiplicative arithmetic
paillier cryptosystem
Paillier homomorphic cryptosystem
Paillier homomorphic encryption scheme
pubcrawl
public-key cryptosystem
Resiliency
Scalability
storage paradigm
biblio
A survey on Symmetric and Asymmetric Key based Image Encryption
Submitted by aekwall on Mon, 01/25/2021 - 11:56am
Cryptography
encryption
Resiliency
Human behavior
pubcrawl
composability
wireless sensor networks
Metrics
Image coding
authenticity
Image Processing
decryption
Asymmetric Encryption
Asymmetric
asymmetric key
cipher text
different transfer mediums
encryption algorithms
encryption approaches
era security
image destruction
image encryption techniques
symmetric
technological advancements especially wireless sensor network
biblio
Random selective block encryption technique for image cryptography using chaotic cryptography
Submitted by aekwall on Mon, 01/18/2021 - 10:20am
Scalability
Cryptography
decryption
Resiliency
pubcrawl
Metrics
random processes
encryption
Image Processing
Diffusion
permutation
chaotic cryptography
block-based image encryption
chaotic
data stream generation
dynamic random growth technique
hybrid chaotic map
image cryptography
plain text imaging
plaintext attack
random data streaming
random selective block encryption technique
secured image transmission systems
biblio
AMOUN: Lightweight Scalable Multi-recipient Asymmetric Cryptographic Scheme
Submitted by aekwall on Mon, 08/10/2020 - 9:49am
encryption
Computational efficiency
decryption
Resiliency
Human behavior
pubcrawl
privacy
Metrics
Public key
public key cryptography
Security analysis
Compositionality
symmetric cryptography
network resources
Asymmetric Encryption
communication overhead
asymmetric cryptography
Cathode ray tubes
Chinese remainder theorem
chosen plaintext attack
dynamic networks
group membership changes
high computational cost
lightweight AMOUN
lightweight scalable multirecipient asymmetric cryptographic scheme
Multi-recipient Encryption
multiple recipients
MultiRSA
securing multiparty communication
biblio
Biomedical Image Encryption Based on Fractional Discrete Cosine Transform with Singular Value Decomposition and Chaotic System
Submitted by grigby1 on Fri, 07/03/2020 - 3:55pm
biomedical image encryption
chaotic system
Compositionality
Cryptography
cyber physical systems
decomposition
decryption
different medical images
discrete cosine transforms
encryption
Fourier transforms
fractional discrete cosine transform
fractional Fourier
FrDCT
Image coding
image sequences
Logistics
Medical diagnostic imaging
medical image encryption
medical image processing
Metrics
optical chaos
pubcrawl
singular value decomposition
biblio
Image Encryption and Decryption using Enigma Algorithm
Submitted by grigby1 on Fri, 06/26/2020 - 11:44am
Algorithm
blue intensity
Breadboard
composability
computationally efficient procedure
Cryptography
cyber-physical systems
decryption
efficient encryption
encrypting decrypting images
encryption
enigma
enigma algorithm
enigma machine
green intensity
highly advanced technologies
image colour analysis
image encryption
image encryptions
image security
Mathematical model
military communication
original RGB value
pixel
pubcrawl
red intensity
resilience
Resiliency
Rotors
secured image processing
secured procedure
1
2
3
4
next ›
last »