Two-stage data encryption using chaotic neural networks
暂无分享,去创建一个
Gautam Srivastava | Revathi Venkataraman | N. Parthiban | V. Kavitha | C. N. S. Vinoth Kumar | Gautam Srivastava | R. Venkataraman | V. Kavitha | N. Parthiban | Gautam Srivastava | C. N. S. V. Kumar
[1] Gautam Srivastava,et al. Effective Heart Disease Prediction Using Hybrid Machine Learning Techniques , 2019, IEEE Access.
[2] Gautam Srivastava,et al. Sufficiency Criterion for A Subfamily of Meromorphic Multivalent Functions of Reciprocal Order with Respect to Symmetric Points , 2019, Symmetry.
[3] Sarfraz Nawaz Malik,et al. Geometric Properties of Certain Classes of Analytic Functions Associated with a q-Integral Operator , 2019, Symmetry.
[4] Gautam Srivastava,et al. Generalized Mittag-Leffler Input Stability of the Fractional Differential Equations , 2019, Symmetry.
[5] Gautam Srivastava,et al. Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices , 2019, IEEE Access.
[6] Gautam Srivastava,et al. Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM , 2019, Cryptogr..
[7] Gautam Srivastava,et al. Differential Cryptanalysis of Round-Reduced LEA , 2018, IEEE Access.
[8] Gautam Srivastava,et al. PHANTOM Protocol as the New Crypto-Democracy , 2018, CISIM.
[9] Benjamin Turnbull,et al. Modeling and Simulation Approaches , 2018, Cyber Resilience of Systems and Networks.
[10] Ahmed Farouk,et al. A New Quantum Gray-Scale Image Encoding Scheme , 2018 .
[11] Ahmed Farouk,et al. Multipartite quantum correlations among atoms in QED cavities , 2018 .
[12] Ahmed Farouk,et al. Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states , 2017, Frontiers of Physics.
[13] Ahmed Farouk,et al. A New Quantum Watermarking Based on Quantum Wavelet Transforms , 2017 .
[14] Saleh Mobayen,et al. Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control , 2017, Nonlinear Dynamics.
[15] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[16] J. Batle,et al. Shareability of correlations in multiqubit states: Optimization of nonlocal monogamy inequalities , 2017 .
[17] Minyi Guo,et al. LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[18] Ahmed Farouk,et al. Do multipartite correlations speed up adiabatic quantum computation or quantum annealing? , 2016, Quantum Information Processing.
[19] Ahmed Farouk,et al. A generalized architecture of quantum secure direct communication for N disjointed users with authentication , 2015, Scientific Reports.
[20] Ahmed Farouk,et al. A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation , 2015, Quantum Information Processing.
[21] Xiaolei Dong,et al. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..
[22] Virgil D. Gligor,et al. Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme , 2015, 2015 IEEE International Conference on Communications (ICC).
[23] Jianguo Jiang,et al. An Intra Prediction Mode-Based Video Encryption Algorithm in H.264 , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[24] Rabi N. Mahapatra,et al. A key pre-distribution scheme for heterogeneous sensor networks , 2009, IWCMC.
[25] H. Kezia,et al. Encryption of Digital Video Based on Lorenz Chaotic System , 2008, 2008 16th International Conference on Advanced Computing and Communications.
[26] V. Jeoti,et al. On Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme , 2007, 2007 International Conference on Signal Processing, Communications and Networking.
[27] Bryan Parno,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[28] James Michael Stewart,et al. CISSP: Certified Information Systems Security Professional Study Guide, 2nd Edition , 2004 .
[29] Donggang Liu,et al. Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.
[30] P. Ning,et al. Establishing pairwise keys in distributed sensor networks , 2003, CCS '03.
[31] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[32] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[33] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[34] Chenyang Lu,et al. RAP: a real-time communication architecture for large-scale wireless sensor networks , 2002, Proceedings. Eighth IEEE Real-Time and Embedded Technology and Applications Symposium.
[35] Donggang Liu,et al. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.
[36] Sean W. Smith,et al. Building the IBM 4758 Secure Coprocessor , 2001, Computer.
[37] J. D. Tygar,et al. SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.
[38] Steve H. Weingart. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.
[39] Sean W. Smith,et al. Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.
[40] K. Aihara,et al. Chaotic neural networks , 1990 .
[41] Gautam Srivastava,et al. A Novel Auto-Focus Method for Image Processing Using Laser Triangulation , 2019, IEEE Access.
[42] A. Suhasini,et al. Secured Three-Tier Architecture for Wireless Sensor Networks Using Chaotic Neural Network , 2017 .
[43] Omar Zakaria,et al. An Overview of Video Encryption Techniques , 2009 .
[44] Dawn Song,et al. Key distribution techniques for sensor networks , 2004 .
[45] Design, Security , 2022 .