SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION
暂无分享,去创建一个
[1] Kamaljit I. Lakhtaria. Protecting Computer Network with Encryption Technique: A Study , 2011, UCMA.
[2] David Pointcheval,et al. Parallel authentication and public-key encryption , 2003 .
[3] Claude Castelluccia,et al. A security framework for privacy-preserving data aggregation in wireless sensor networks , 2011, TOSN.
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[7] Shaik Rasool,et al. EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE , 2010 .
[8] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[9] Ajit Singh,et al. DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING , 2011 .
[10] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[11] Padma Bh,et al. Encoding And Decoding of a Message in the Implementation of Elliptic Curve Cryptography using Koblitz's Method , 2010 .
[12] A. A. Zaidan,et al. On the Differences between Hiding Information and Cryptography Techniques: An Overview , 2010 .
[13] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[14] E. Ramaraj,et al. A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking , 2006 .
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[17] Thawatchai Chomsiri. A Comparative Study of Security Level of Hotmail, Gmail and Yahoo Mail by Using Session Hijacking Hacking Test , 2008 .