Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Fostering collaboration among CPS professionals in academia, government, and industry
CPS-VO
Fuzzy Cryptography
biblio
BioCanCrypto: An LDPC Coded Bio-Cryptosystem on Fingerprint Cancellable Template
Submitted by grigby1 on Tue, 09/20/2022 - 2:34pm
feature extraction
pubcrawl
Metrics
resilience
Conferences
Scalability
privacy
data privacy
Fingerprint recognition
Redundancy
parity check codes
Resiliency
Fuzzy Cryptography
biblio
Eigen-Fingerprints-Based Remote Authentication Cryptosystem
Submitted by grigby1 on Tue, 09/20/2022 - 2:34pm
biometrics (access control)
Fuzzy Cryptography
Remote authentication
Key Binding
fuzzy vault
fuzzy commitment
Eigen-Fingerprints
codes
Resiliency
Internet of Things
Mathematics
wireless networks
Cryptography
Scalability
resilience
Metrics
pubcrawl
feature extraction
biblio
Comparing Ransomware using TLSH and @DisCo Analysis Frameworks
Submitted by grigby1 on Tue, 09/20/2022 - 2:34pm
pubcrawl
Metrics
resilience
Conferences
Scalability
Big Data
Feeds
Ransomware
Resiliency
Intermediate Representation
Locality-Sensitive Hash
threat indicators
Fuzzy Cryptography
biblio
Non-Invertibility for Random Projection based Biometric Template Protection Scheme
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
pubcrawl
Metrics
resilience
Scalability
authentication
Cryptography
information management
biometrics (access control)
Resiliency
biometric template protection
discriminability
fuzzy commitment
non-invertibility
random projection
Fuzzy Cryptography
biblio
Improvement of Security in Multi-Biometric Cryptosystem by Modulus Fuzzy Vault Algorithm
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
Clustering algorithms
Fuzzy Cryptography
Modulus Fuzzy Vault
Modified Balanced Iterative Reducing and Clustering using Hierarchies
Ear
Boosted Double Plateau Histogram Equalization
Bidirectional Deer Hunting optimization Algorithm
Resiliency
image segmentation
feature extraction
Histograms
Measurement
Fingerprint recognition
Scalability
resilience
Metrics
pubcrawl
biblio
Fuzzy Key Generator Design using ReRAM-Based Physically Unclonable Functions
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
Sensitivity
Fuzzy Cryptography
ReRAM technology
physically unclonable functions
hardware-based authentication
fuzzy extractors
Resiliency
Physical Unclonable Function
Iron
pubcrawl
Bit error rate
Time factors
Resistance
IoT security
Cryptography
Scalability
resilience
Metrics
biblio
Fuzzy AHP based Ranking of Cryptography Indicators
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
Telecommunications
Fuzzy Cryptography
Quantum encryption
Multi-criteria decision-making
FAHP
Costs
Resiliency
analytic hierarchy process
RSA
encryption
Robustness
Artificial Intelligence
Scalability
AES
Hardware
resilience
Metrics
pubcrawl
biblio
Passenger Volume Interval Prediction based on MTIGM (1,1) and BP Neural Network
Submitted by grigby1 on Tue, 09/20/2022 - 2:33pm
BP Neural Network
Fuzzy Cryptography
Ternary interval number
Passenger volume
MTIGM (1
1)
Fitting
Resiliency
Market research
Grey relational degree
Predictive models
Time series analysis
Solid modeling
Decision Making
Scalability
resilience
Metrics
pubcrawl
Neural networks
biblio
A Robust Protocol for Smart eHealthcare based on Elliptic Curve Cryptography and Fuzzy logic in IoT
Submitted by grigby1 on Fri, 09/16/2022 - 4:47pm
OLSR routing algorithm
security
Routing protocols
Routing
Resiliency
resilience
pubcrawl
Pseudo random numbers
Pollard’s ρ
Fuzzy Cryptography
Metrics
Medical services
Internet-of-Medical Things
Fuzzy logic
Elliptic curve cryptography
data privacy
Blackhole attack
authentication
biblio
An Efficient Authentication Scheme for Fog Computing Environment using Symmetric Cryptographic methods
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
Fuzzy Cryptography
authentication
Cloud Computing
Costs
Fog computing
key management
Mobile handsets
ProVerif
pubcrawl
resilience
Resiliency
Resists
Scalability
security
security issues
Servers
1
2
3
next ›
last »