A New Hybrid Cryptosystem for Internet of Things Applications
暂无分享,去创建一个
[1] Asoke Nath,et al. Symmetric key cryptosystem using combined cryptographic algorithms - Generalized modified Vernam Cipher method, MSA method and NJJSAA method: TTJSA algorithm , 2011, 2011 World Congress on Information and Communication Technologies.
[2] Maryline Laurent-Maknavicius,et al. Survey on secure communication protocols for the Internet of Things , 2015, Ad Hoc Networks.
[3] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .
[4] Chris Hare,et al. Internet Security Professional Reference, Second Edition , 1998 .
[5] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[6] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[7] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[8] Carl M. Ellison,et al. The nature of a useable PKI , 1999, Comput. Networks.
[9] Sitesh Kumar Sinha,et al. A New Way of Design and Implementation of Hybrid Encryption to Protect Confidential Information from Malicious Attack in Network , 2013 .
[10] Eduardo Jacob,et al. Cyber-security in substation automation systems , 2016 .
[11] Charles P. Pfleeger,et al. Security in computing , 1988 .
[12] Joonsang Baek,et al. Compact identity-based encryption without strong symmetric cipher , 2011, ASIACCS '11.
[13] Sheetal Kalra,et al. Secure authentication scheme for IoT and cloud servers , 2015, Pervasive Mob. Comput..
[14] CORPORATE NIST. The digital signature standard , 1992, CACM.
[15] Denise Demirel,et al. An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme , 2015, IACR Cryptol. ePrint Arch..
[16] Ralf Küsters,et al. Computational soundness for key exchange protocols with symmetric encryption , 2009, CCS.
[17] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[18] Antoine Joux,et al. Differential Collisions in SHA-0 , 1998, CRYPTO.
[19] Saudi Arabia,et al. SwiftEnc: Hybrid Cryptosystem with Hash-Based Dynamic Key Encryption , 2015, ICIT 2015.
[20] Chris Hare,et al. Internet Security: Professional Reference , 1996 .
[21] Bibhudendra Acharya,et al. Image encryption using index based chaotic sequence, M sequence and gold sequence , 2011, ICCCS '11.