A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
暂无分享,去创建一个
Milan Milosavljević | Zoran Banjac | Tomislav Unkašević | M. Milosavljevic | Z. Banjac | T. Unkašević
[1] Mark Stamp,et al. Applied Cryptanalysis: Breaking Ciphers in the Real World , 2007 .
[2] Goutam Paul,et al. (Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher , 2012, Journal of Cryptology.
[3] B V Santhosh Krishna,et al. A systematic study of security issues in Internet-of-Things (IoT) , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[4] Byung-Seo Kim,et al. IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey , 2018, Sensors.
[5] David M. Wheeler,et al. Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment , 2019 .
[6] S. Ziegler. Internet of Things Security and Data Protection , 2019, Internet of Things.
[7] Carsten Maple,et al. Security and privacy in the internet of things , 2017 .
[8] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[9] Samer Salam,et al. Internet of Things From Hype to Reality , 2017 .
[10] Nicolas Privault,et al. Understanding Markov Chains , 2013 .
[11] Zaigham Mahmood,et al. Security, Privacy and Trust in the IoT Environment , 2019, Springer International Publishing.
[12] Giancarlo Fortino,et al. Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.
[13] Lei Yang,et al. Security and Privacy in the Internet of Things , 2017 .
[14] Yang Xiao,et al. Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..
[15] Leonid Smalov,et al. Energy-aware Security in M-Commerce and the Internet of Things , 2009 .
[16] Georgios Kambourakis,et al. Security and Privacy in Wireless and Mobile Networks , 2018, Future Internet.
[17] Imed Romdhani,et al. Architecting the Internet of Things: State of the Art , 2016 .
[18] Daniel G. Costa,et al. Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions , 2017, Cryptogr..
[19] J. Kim,et al. How collaboration networks affect innovation in Korea’s information and communication technology industry in the era of Internet of Things , 2016 .
[20] Gabriel Villarrubia,et al. PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices , 2019, Sensors.
[21] Alex Biryukov,et al. State of the Art in Lightweight Symmetric Cryptography , 2017, IACR Cryptol. ePrint Arch..
[22] Ronald L. Rivest,et al. Spritz - a spongy RC4-like stream cipher and hash function , 2016, IACR Cryptol. ePrint Arch..
[23] Robert John Walters,et al. Internet of Things: State-of-the-art, Challenges, Applications, and Open Issues , 2018, International Journal of Intelligent Computing Research.
[24] Muhammad Bilal,et al. An Authentication Protocol for Future Sensor Networks , 2017, Sensors.
[25] Pardeep Kumar,et al. Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.