CMOS technology-based energy efficient artificial neural session key synchronization for securing IoT
暂无分享,去创建一个
[1] Muhammad Khurram Khan,et al. Designing Anonymous Signature-Based Authenticated Key Exchange Scheme for IoT-Enabled Smart Grid Systems , 2020 .
[2] Tingwen Huang,et al. Neural Cryptography Based on Complex-Valued Neural Network , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[3] Vinod Patidar,et al. A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing , 2009, Informatica.
[4] Xin Yang,et al. Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devices , 2021, IEEE Transactions on Industrial Informatics.
[5] Subhendu Kumar Pani,et al. Artificial Neural Synchronization Using Nature Inspired Whale Optimization , 2021, IEEE Access.
[6] Pranita P. Hadke,et al. Use of Neural Networks in cryptography: A review , 2016, 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave).
[7] Marcin Niemiec,et al. Error correction in quantum cryptography based on artificial neural networks , 2018, Quantum Inf. Process..
[8] Walter Fuertes,et al. On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key , 2019, Secur. Commun. Networks.
[9] Arindam Sarkar. Multilayer neural network synchronized secured session key based encryption in wireless communication , 2019 .
[10] Sebastian Wallner,et al. Secure communication in microcomputer bus systems for embedded devices , 2008, J. Syst. Archit..
[11] Neeraj Kumar,et al. An Efficient Spam Detection Technique for IoT Devices Using Machine Learning , 2021, IEEE Transactions on Industrial Informatics.
[12] Muhammad Saadi,et al. An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT , 2021, Wireless Personal Communications.
[13] Arindam Sarkar,et al. Secure exchange of information using artificial intelligence and chaotic system guided neural synchronization , 2021, Multimedia Tools and Applications.
[14] Arindam Sarkar,et al. Generative adversarial network guided mutual learning based synchronization of cluster of neural networks , 2021, Complex & Intelligent Systems.
[15] Arindam Sarkar,et al. Deep Learning Guided Double Hidden Layer Neural Synchronization Through Mutual Learning , 2021, Neural Processing Letters.
[16] Wolfgang Kinzel,et al. Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..
[17] Zainab Khyioon Abdalrdha,et al. Subject Review : Key Generation in Different Cryptography Algorithm , 2019 .
[18] Miroslav Voznák,et al. Error Reconciliation in Quantum Key Distribution Protocols , 2020, Selected Results of the COST Action IC1405.
[19] Markus Volkmer,et al. Tree parity machine rekeying architectures , 2005, IEEE Transactions on Computers.
[20] Mattia Frasca,et al. A true random bit generator based on a memristive chaotic circuit: Analysis, design and FPGA implementation , 2019, Chaos, Solitons & Fractals.
[21] Dowon Hong,et al. Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems , 2021, Secur. Commun. Networks.
[22] Wolfgang Kinzel,et al. Cooperating attackers in neural cryptography. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.
[23] Lingfeng Liu,et al. Pseudorandom bit generator based on non-stationary logistic maps , 2016, IET Inf. Secur..
[24] K Lavanya,et al. VECTORIZED NEURAL KEY EXCHANGE USING TREE PARITY MACHINE , 2019 .
[25] J. K. Mandal,et al. Key Generation and Certification using Multilayer Perceptron in Wireless communication(KGCMLP) , 2012, ArXiv.
[26] Michal Dolecki,et al. The Impact of the TPM Weights Distribution on Network Synchronization Time , 2015, CISIM.
[27] Shubham Mishra,et al. An TPM Based Approach for Generation of Secret Key , 2019, International Journal of Computer Network and Information Security.
[28] Andreas Ruttor,et al. Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.
[29] Zhigang Zeng,et al. Global Synchronization of Coupled Fractional-Order Recurrent Neural Networks , 2019, IEEE Transactions on Neural Networks and Learning Systems.
[30] Miroslav Voznak,et al. Security Verification of Artificial Neural Networks Used to Error Correction in Quantum Cryptography , 2018, 2018 26th Telecommunications Forum (TELFOR).
[31] Andreas Ruttor,et al. Dynamics of neural cryptography. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.
[32] Wolfgang Kinzel,et al. Cryptography based on neural networks—analytical results , 2002 .
[33] Yan Zhang,et al. Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT , 2020, IEEE Transactions on Industrial Informatics.
[34] Lela Mirtskhulava,et al. Enhancing IoT Security Using Multi-Layer Feedforward Neural Network with Tree Parity Machine Elements , 2020 .