Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
QR codes
biblio
Singular Value Decomposition (SVD) based Image Tamper Detection Scheme
Submitted by grigby1 on Tue, 12/15/2020 - 12:27pm
Cryptography
pubcrawl
Metrics
resilience
Resiliency
security
Compositionality
feature extraction
source coding
Image coding
singular value decomposition
coding theory
SVD
digital imaging
image authentication
image authentication techniques
image tamper detection scheme
QR code
QR codes
quick response code
quick response code feature extraction
S matrix
S-matrix theory
singular values
biblio
QRStream: A Secure and Convenient Method for Text Healthcare Data Transferring
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
security of data
Servers
data privacy
electronic health records
Medical services
Organizations
Resiliency
pubcrawl
Cryptography
Decoding
metadata
Libraries
text analysis
cyber physical systems
security problems
Payloads
health care
QR codes
privacy problems
electronic health data transferring
health awareness
health data delivery
health information
healthcare activities
healthcare organization
QRStream
text healthcare data transferring
biblio
Reversible Data Hiding Based Key Region Protection Method in Medical Images
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
Cryptography
data privacy
Resiliency
pubcrawl
data encapsulation
data leakage
Image coding
image watermarking
cyber physical systems
image segmentation
image retrieval
QR code
QR codes
image encryption
privacy issues
Selective Encryption
encryption key
high-texture area
image restoration
information loss
information-hiding
key region
key region protection method
lesion areas
medical image copyright
medical image data
medical image processing
medical images
open network environment
original image
original key regions
original lesion information
patient privacy
patient-sensitive information
reversible data hiding
reversible data-hiding algorithm
texture complexity
biblio
Image steganography using texture features and GANs
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
feature extraction
Resiliency
pubcrawl
Cryptography
cyber physical systems
QR code
QR codes
deep neural networks
image texture
mean squared error
secret information
Steganography
adversarial discriminator
Adversarial training
complex texture regions
convolutional network
cover images
encoder-decoder framework
hidden writing
Image Steganography
invisible perturbations
natural images
stego image distortions
stego images
texture feature
texture features
texture-based loss
truncated layer
varisized images
biblio
A Multiple Layer Security Scheme Utilizing Information Matrices
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
Cryptography
telecommunication security
Resiliency
pubcrawl
matrix algebra
cyber physical systems
QR codes
AES algorithm
secret data
Steganography
double-layer message security scheme
information matrices
information matrix
least significant bit embedding
multiple layer security scheme
secret message
word length 256 bit
biblio
Implementation QR Code Biometric Authentication for Online Payment
Submitted by aekwall on Mon, 03/30/2020 - 10:40am
Cryptography
mobile computing
Resiliency
pubcrawl
cyber physical systems
cloud server
electronic money
QR code
QR codes
transaction processing
bank implementation QR code biometric authentication payment online
biometric
Code Scan QR
debit card
decryption transaction permission
face biometric encryption
face verification transaction
implementation biometric cloud authentication platform
low-cost infrastructure
online merchant
online payment
QR code scan
simple transaction payment
transaction permits
transaction process
transaction sample
biblio
Security Of Cryptocurrency Using Hardware Wallet And QR Code
Submitted by aekwall on Mon, 03/30/2020 - 10:39am
authorisation
data privacy
private key cryptography
mobile computing
Resiliency
pubcrawl
Peer-to-peer computing
Cryptography
blockchain
smart phones
cyber physical systems
cryptocurrency
electronic money
Android (operating system)
QR code
QR codes
Android applications
transaction processing
bitcoin transaction
cold wallet
cross QR code scanning
cryptocurrency wallet
digital online transaction
hardware wallet
Hot Wallet
hot wallet application
QR code-based android application
secure private key storage
secure transaction confirmation
biblio
A Secure QR Code System for Sharing Personal Confidential Information
Submitted by aekwall on Mon, 03/30/2020 - 10:39am
Cryptography
cyber physical systems
decryption
encryption
pubcrawl
QR codes
Quick Response (QR) Code
Resiliency
RSA
Secure QR Code (SQRC)
Validation.
verification
biblio
Encrypted QR Code Based Optical Challenge-Response Authentication by Mobile Devices for Mounting Concealed File System
Submitted by aekwall on Mon, 03/30/2020 - 10:39am
private key cryptography
invasive software
mobile computing
Resiliency
pubcrawl
Ransomware
Cryptography
authentication
message authentication
cyber physical systems
Mobile Security
public key cryptography
smart phones
QR codes
mobile devices
challenge-response scheme
Data Breach
encrypted QR code
mounting authentication
mounting authentication scheme
mounting concealed file system
optical challenge response
optical challenge-response authentication
Portable computers
QR code exchanges
QR code technologies
biblio
Mitigation of hard-coded credentials related attacks using QR code and secured web service for IoT
Submitted by aekwall on Mon, 03/30/2020 - 10:39am
computer network security
DDoS
authorisation
Cryptography
Internet of Things
IoT devices
invasive software
Resiliency
pubcrawl
web services
cyber physical systems
QR code
QR codes
IoT manufacturers
password
clear text log-in id
GUI
Hard-coded credentials
hard-coded credentials related attacks
lightweight security algorithm
QR code based approach
Response code
secured web service
security concerns
SSL
1
2
3
4
next ›
last »