Two-stage data encryption using chaotic neural networks

[1]  Gautam Srivastava,et al.  Effective Heart Disease Prediction Using Hybrid Machine Learning Techniques , 2019, IEEE Access.

[2]  Gautam Srivastava,et al.  Sufficiency Criterion for A Subfamily of Meromorphic Multivalent Functions of Reciprocal Order with Respect to Symmetric Points , 2019, Symmetry.

[3]  Sarfraz Nawaz Malik,et al.  Geometric Properties of Certain Classes of Analytic Functions Associated with a q-Integral Operator , 2019, Symmetry.

[4]  Gautam Srivastava,et al.  Generalized Mittag-Leffler Input Stability of the Fractional Differential Equations , 2019, Symmetry.

[5]  Gautam Srivastava,et al.  Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices , 2019, IEEE Access.

[6]  Gautam Srivastava,et al.  Cryptanalysis of Round-Reduced Fantomas, Robin and iSCREAM , 2019, Cryptogr..

[7]  Gautam Srivastava,et al.  Differential Cryptanalysis of Round-Reduced LEA , 2018, IEEE Access.

[8]  Gautam Srivastava,et al.  PHANTOM Protocol as the New Crypto-Democracy , 2018, CISIM.

[9]  Benjamin Turnbull,et al.  Modeling and Simulation Approaches , 2018, Cyber Resilience of Systems and Networks.

[10]  Ahmed Farouk,et al.  A New Quantum Gray-Scale Image Encoding Scheme , 2018 .

[11]  Ahmed Farouk,et al.  Multipartite quantum correlations among atoms in QED cavities , 2018 .

[12]  Ahmed Farouk,et al.  Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states , 2017, Frontiers of Physics.

[13]  Ahmed Farouk,et al.  A New Quantum Watermarking Based on Quantum Wavelet Transforms , 2017 .

[14]  Saleh Mobayen,et al.  Secure communication in wireless sensor networks based on chaos synchronization using adaptive sliding mode control , 2017, Nonlinear Dynamics.

[15]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[16]  J. Batle,et al.  Shareability of correlations in multiqubit states: Optimization of nonlocal monogamy inequalities , 2017 .

[17]  Minyi Guo,et al.  LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

[18]  Ahmed Farouk,et al.  Do multipartite correlations speed up adiabatic quantum computation or quantum annealing? , 2016, Quantum Information Processing.

[19]  Ahmed Farouk,et al.  A generalized architecture of quantum secure direct communication for N disjointed users with authentication , 2015, Scientific Reports.

[20]  Ahmed Farouk,et al.  A scheme for secure quantum communication network with authentication using GHZ-like states and cluster states controlled teleportation , 2015, Quantum Information Processing.

[21]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[22]  Virgil D. Gligor,et al.  Designing secure and reliable wireless sensor networks under a pairwise key predistribution scheme , 2015, 2015 IEEE International Conference on Communications (ICC).

[23]  Jianguo Jiang,et al.  An Intra Prediction Mode-Based Video Encryption Algorithm in H.264 , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[24]  Rabi N. Mahapatra,et al.  A key pre-distribution scheme for heterogeneous sensor networks , 2009, IWCMC.

[25]  H. Kezia,et al.  Encryption of Digital Video Based on Lorenz Chaotic System , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[26]  V. Jeoti,et al.  On Image Encryption: Comparison between AES and a Novel Chaotic Encryption Scheme , 2007, 2007 International Conference on Signal Processing, Communications and Networking.

[27]  Bryan Parno,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[28]  James Michael Stewart,et al.  CISSP: Certified Information Systems Security Professional Study Guide, 2nd Edition , 2004 .

[29]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[30]  P. Ning,et al.  Establishing pairwise keys in distributed sensor networks , 2003, CCS '03.

[31]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[32]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[33]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[34]  Chenyang Lu,et al.  RAP: a real-time communication architecture for large-scale wireless sensor networks , 2002, Proceedings. Eighth IEEE Real-Time and Embedded Technology and Applications Symposium.

[35]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[36]  Sean W. Smith,et al.  Building the IBM 4758 Secure Coprocessor , 2001, Computer.

[37]  J. D. Tygar,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[38]  Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences , 2000, CHES.

[39]  Sean W. Smith,et al.  Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.

[40]  K. Aihara,et al.  Chaotic neural networks , 1990 .

[41]  Gautam Srivastava,et al.  A Novel Auto-Focus Method for Image Processing Using Laser Triangulation , 2019, IEEE Access.

[42]  A. Suhasini,et al.  Secured Three-Tier Architecture for Wireless Sensor Networks Using Chaotic Neural Network , 2017 .

[43]  Omar Zakaria,et al.  An Overview of Video Encryption Techniques , 2009 .

[44]  Dawn Song,et al.  Key distribution techniques for sensor networks , 2004 .

[45]  Design, Security , 2022 .