Secure Communication Using Encryption, Challenges and Open Issues
暂无分享,去创建一个
[1] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[2] Jibi Abraham,et al. ANALYSIS AND COMPARISON OF SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHMS BASED ON VARIOUS FILE FEATURES , 2014 .
[3] Alfredo Pironti,et al. Formal verification of security protocol implementations: a survey , 2012, Formal Aspects of Computing.
[4] Mohie M. Hadhoud,et al. Performance Evaluation of Symmetric Encryption Algorithms , 2008 .
[5] Peter Kruus,et al. TinyPK: securing sensor networks with public key technology , 2004, SASN '04.
[6] Yih-Chun Hu,et al. Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.
[7] Ilya Mironov,et al. Hash functions: Theory, attacks, and applications , 2005 .
[8] Mohit Jain,et al. Approaches to Formal Verification of Security Protocols , 2011, ArXiv.
[9] K. Govinda,et al. Identity anonymization and secure data storage using group signature in private cloud , 2012, ICACCI '12.