Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
encryption
biblio
Compressive Sensing and Hyper-Chaos Based Image Compression-Encryption
Submitted by
grigby1
on Tue, 12/10/2019 - 10:21am
2D-Compressive Sensing
chaos
chaos based measurement matrix construction
chaotic communication
cipher image
composability
compressed sensing
Compression
compression-encryption algorithm
compressive sampling
compressive sensing
Cryptography
Cyber Physical System
cyber physical systems
data compression
encryption
Hyper-chaos
hyper-chaos based diffusion
hyper-chaos based image compression-encryption algorithm
Image coding
Image reconstruction
linear measurements
Logistics
matrix algebra
privacy
pubcrawl
resilience
Resiliency
security
sparse coefficients
Sparse matrices
Two dimensional displays
biblio
Peapods: OS-Independent Memory Confidentiality for Cryptographic Engines
Submitted by
aekwall
on Mon, 12/02/2019 - 11:08am
Scalability
Cryptography
encryption
Kernel
Resiliency
pubcrawl
Metrics
Data protection
OS kernel
Random access memory
Engines
operating systems (computers)
Compositionality
Registers
program compilers
automatic protection
code fragments
compiler
confidentiality
cryptographic engines
Cryptographic Implementation
cryptographic keys
DRAM chips
memory disclosure attack
memory disclosure attacks
OS-independent memory confidentiality
Peapods
sensitive variables
software engines
Transactional memory
user-mode protection
compiler security
biblio
Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL
Submitted by
aekwall
on Mon, 12/02/2019 - 11:04am
Servers
encryption
Resiliency
pubcrawl
composability
Metrics
public key cryptography
Elliptic curve cryptography
Elliptic curves
command injection attacks
Bitcoin curve
elliptic curve parameters
embedded security
Fault attack
Invalid curve attack
Loading
Neves curve attack
OpenSSL
OpenSSL command line tools
Rapsberry Pi single board computer
Singular curve
singular curve point decompression attacks
Supersingular curve
Tibouchis degenerate curve attack
biblio
SCIQ-CD: A Secure Scheme to Provide Confidentiality and Integrity of Query results for Cloud Databases
Submitted by
aekwall
on Mon, 11/25/2019 - 1:11pm
Cloud Computing
authorisation
Cryptography
encryption
data privacy
cloud storage
Trusted Computing
Resiliency
pubcrawl
composability
Metrics
query processing
Databases
metadata
database management systems
data integrity
outsourcing
cloud databases
data confidentiality
Database as a service
database outsourcing
database queries
database service providers
SCIQ-CD
secure scheme to provide confidentiality and integrity of query
trusted authority
Outsourced Database Integrity
biblio
A Delayed Feedback Chaotic Encryption Algorithm Based on Polar Codes
Submitted by
aekwall
on Mon, 11/25/2019 - 1:10pm
security of data
Cryptography
encryption
Resiliency
pubcrawl
composability
Communication system security
Wireless communication
feedback
Reliability
Predictive Metrics
chaos
chaotic communication
channel coding
wireless channels
chaotic system
cryptanalysis
chaotic cryptography
binary keys extraction
chaotic sequences
data transmission security
delayed feedback
delayed feedback chaotic encryption algorithm
encoding information protection
physical layer security
polar codes
biblio
Secure speech communication system based on scrambling and masking by chaotic maps
Submitted by
aekwall
on Mon, 11/25/2019 - 1:09pm
Cryptography
encryption
Receivers
telecommunication security
information security
Resiliency
pubcrawl
composability
synchronisation
Synchronization
Predictive Metrics
chaotic communication
chaotic cryptography
Transmitters
channel problems
chaotic encryption
Chaotic maps
chaotic masking
chaotic scrambling
chaotic scrambling and masking
Chaotic systems
communication security
masking
MatLab simulation
public channels
scrambling
secure speech communication system
signal denoising
speech processing
SSSNR
two encryption levels
biblio
Speech and Audio Cryptography System using Chaotic Mapping and Modified Euler's System
Submitted by
aekwall
on Mon, 11/25/2019 - 1:09pm
Cryptography
encryption
Conferences
Resiliency
pubcrawl
composability
information technology
Predictive Metrics
chaos
chaotic communication
Three-dimensional displays
chaotic cryptography
2D mapping function
3D mapping function
audio cryptography system
audio file
audio signal processing
Chaotic Mapping
euler numerical resolution
Henon mapping
Lorenz 3D mapping
modified Euler system
speech coding
speech cryptography
Two dimensional displays
biblio
A single, triple chaotic cryptography using chaos in digital filter and its own comparison to DES and triple DES
Submitted by
aekwall
on Mon, 11/25/2019 - 1:09pm
Cryptography
encryption
Resiliency
pubcrawl
composability
Data protection
computational complexity
digital filter
Predictive Metrics
chaos
chaotic cryptography
Chaos in Digital Filter
Data Encryption Standard
DES
Digital filters
MatLab simulation
multimedia cryptography
performance speed
Periodic structures
rayscale image
Sensitivity
single chaotic cryptography
triple chaotic cryptography
Triple DES
triple form
biblio
A Secure Voice Channel using Chaotic Cryptography Algorithm
Submitted by
aekwall
on Mon, 11/25/2019 - 1:09pm
field programmable gate arrays
Cryptography
encryption
Receivers
telecommunication security
eavesdropping
Resiliency
pubcrawl
composability
Ciphers
Predictive Metrics
chaotic communication
asynchronous communication
chaotic cryptographic algorithm
chaotic cryptography
chaotic cryptography algorithm
chiper feedback
Cipher feedback mode
communicaiton channel prototype
decryption process
encrypted channel
encryption process
encryption-decription cycle
FPGA Spartan-3
high processing speed
nonecrypted channel
secure voice channel
secure voice communications channel
secured channel
secured communication channel
Spartan-3 FPGA board
time 202.0 mus
unwanted eavesdropping
voice communication
voice messages
biblio
Outsourced Private Function Evaluation with Privacy Policy Enforcement
Submitted by
aekwall
on Mon, 11/11/2019 - 10:47am
Cloud Computing
Scalability
Cryptography
encryption
data privacy
learning (artificial intelligence)
machine learning
Human behavior
pubcrawl
privacy
attribute-based encryption
client policy
data contributor
drugs
evaluator policy
genetic epidemiology
Genetics
Homomorphic encryption
hospitals
OPFE-PPE
outsourced private function evaluation
outsourcing
personalized medication
Policy Oblivious Encryption
Privacy Policies
privacy policy enforcement
private data
Private Function Evaluation
1
2
3
4
5
6
7
8
9
…
next ›
last »