Two-phase hybrid cryptography algorithm for wireless sensor networks
暂无分享,去创建一个
[1] Thaier Hayajneh,et al. An energy-efficient and security aware route selection protocol for wireless sensor networks , 2014, Secur. Commun. Networks.
[2] Osama S. Faragallah,et al. An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption , 2007, Informatica.
[3] Omar Seddiki,et al. Integration of chaotic sequences uniformly distributed in a new image encryption algorithm , 2012 .
[4] E. Kannan,et al. A Hybrid Key Management Approach for Secure Communication in Wireless Sensor Networks , 2015 .
[5] Hung-Min Sun,et al. Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.
[6] Yacine Challal,et al. SMART: Secure Multi-pAths Routing for wireless sensor neTworks , 2014, ADHOC-NOW.
[7] Jon Erickson,et al. Hacking: The Art of Exploitation , 2008 .
[8] Fayez W. Zaki,et al. Multi-level stable and energy-efficient clustering protocol in heterogeneous wireless sensor networks , 2014, IET Wirel. Sens. Syst..
[9] Md. Alam Hossain. Cryptanalyzing of Message Digest Algorithms MD4 and MD5 , 2012 .
[10] Arjen K. Lenstra,et al. Unbelievable Security. Matching AES Security Using Public Key Systems , 2001, ASIACRYPT.
[11] Alfred Menezes,et al. The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.
[12] S. Subasree,et al. DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS , 2010 .
[13] William E. Burr,et al. Selecting the Advanced Encryption Standard , 2003, IEEE Secur. Priv..
[14] Maricel O. Balitanas. Wi Fi Protected Access-Pre-Shared Key Hybrid Algorithm , 2009 .
[15] Wuling Ren,et al. A Hybrid Encryption Algorithm Based on DES and RSA in Bluetooth Communication , 2010, 2010 Second International Conference on Modeling, Simulation and Visualization Methods.
[16] Lirui Zhang,et al. A novel D-S based secure localization algorithm for wireless sensor networks , 2014, Secur. Commun. Networks.
[17] Dan Boneh,et al. Cryptanalysis of RSA with private key d less than N0.292 , 2000, IEEE Trans. Inf. Theory.
[18] Gurpreet Singh,et al. A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security , 2013, International Journal of Computer Applications.
[19] L. Scripcariu,et al. Improved RSA Encryption Algorithm for Increased Security of Wireless Networks , 2007, 2007 International Symposium on Signals, Circuits and Systems.
[20] Ahmed Bashir Abugharsa,et al. A Novel Image Encryption Using an Integration Technique of Blocks Rotation Based on the Magic Cube and the AES Algorithm , 2012, ArXiv.
[21] Johann Großschädl,et al. Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography , 2005, ICCSA.
[22] D. Boneh. Cryptanalysis of RSA with Private Key d Less Than N 0 , 1999 .
[23] Ravi Kishore Kodali,et al. Energy Efficient ECC Encryption Using ECDH , 2014 .
[24] Jean Frédéric Myoupo,et al. Secure and Energy-efficient Geocast Protocol for Wireless Sensor Networks based on a Hierarchical Clustered Structure , 2013, Int. J. Netw. Secur..
[25] Shi-hai Zhu,et al. Research of hybrid cipher algorithm application to hydraulic information transmission , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).
[26] Hacène Fouchal,et al. Towards efficient deployment of wireless sensor networks , 2016, Secur. Commun. Networks.