GraphCrypto: Next generation data security approach towards sustainable smart city building
暂无分享,去创建一个
[1] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[2] Vasiliy A. Ustimenko,et al. Graphs with Special Arcs and Cryptography , 2002 .
[3] Alireza Sharifi,et al. Improved Related-Key Boomerang Cryptanalysis of AES-256 , 2010, 2010 International Conference on Information Science and Applications.
[4] Eric Totel,et al. STARLORD: Linked security data exploration in a 3D graph , 2017, 2017 IEEE Symposium on Visualization for Cyber Security (VizSec).
[5] Graham Morgan,et al. Fog Computing Security Challenges and Future Directions [Energy and Security] , 2019, IEEE Consumer Electronics Magazine.
[6] Yaser Jararweh,et al. Trustworthy and sustainable smart city services at the edge , 2020 .
[7] Albert Y. Zomaya,et al. Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World , 2019, IEEE Communications Surveys & Tutorials.
[8] Ho Yean Li,et al. Heuristic cryptanalysis of classical and modern ciphers , 2015, 2005 13th IEEE International Conference on Networks Jointly held with the 2005 IEEE 7th Malaysia International Conf on Communic.
[9] C. Prissette. Weak keys of graph cryptography , 2004, Proceedings. 2004 International Conference on Information and Communication Technologies: From Theory to Applications, 2004..
[10] Shahid Mumtaz,et al. IoT Enabled Quality of Experience Measurement for Next Generation Networks in Smart Cities , 2020 .
[11] Bhagya Nathali Silva,et al. Towards sustainable smart cities: A review of trends, architectures, components, and open challenges in smart cities , 2018 .
[12] Mohd Aizaini Maarof,et al. A survey on the cryptanalysis of the advanced encryption standard , 2006 .
[13] Sagar Sharma,et al. PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[14] P. L. K. Priyadarsini,et al. Ciphers based on special graphs , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[15] Deepak Puthal,et al. Personal Internet of Things (PIoT): What Is It Exactly? , 2021, IEEE Consumer Electronics Magazine.
[16] Vasyl Ustimenko,et al. On the implementation of public keys algorithms based on algebraic graphs over finite commutative rings , 2010, Proceedings of the International Multiconference on Computer Science and Information Technology.
[17] Saurabh Singh,et al. Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city , 2020, Sustainable Cities and Society.
[18] T YangLaurence,et al. A User-centric Security Solution for Internet of Things and Edge Convergence , 2020 .
[19] Paulo S. L. M. Barreto,et al. Faster Key Compression for Isogeny-Based Cryptosystems , 2019, IEEE Transactions on Computers.
[20] Simon Josefsson,et al. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier , 2018, RFC.
[21] Kristin E. Lauter,et al. Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs , 2017, IEEE Security & Privacy.
[22] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[23] Deepak Puthal,et al. Collaborative Edge Computing for Smart Villages [Energy and Security] , 2021, IEEE Consumer Electronics Magazine.
[24] P. L. K. Priyadarsini. A Survey on some Applications of Graph Theory in Cryptography , 2015 .
[25] Ben Bradford,et al. Security and the smart city: A systematic review , 2020 .
[26] Xi Chen,et al. Quantum computing cryptography: Finding cryptographic Boolean functions with quantum annealing by a 2000 qubit D-wave quantum computer. , 2020 .
[27] Jörn Müller-Quade,et al. Symmetric searchable encryption for exact pattern matching using directed Acyclic Word Graphs , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[28] Sean Turner,et al. Use of Elliptic Curve Cryptography (ECC) Algorithms in Cryptographic Message Syntax (CMS) , 2010, RFC.
[29] Albert Y. Zomaya,et al. Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing , 2018, IEEE Communications Magazine.
[30] Chin-Teng Lin,et al. Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment , 2018, IEEE Access.
[31] Mohammad S. Obaidat,et al. Graph-Based Symmetric Crypto-System for Data Confidentiality , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).