Chaos and Logistic Map based Key Generation Technique for AES-driven IoT Security
暂无分享,去创建一个
Ibrahim Khalil | Xun Yi | Ziaur Rahman | Mousumi Sumi | X. Yi | I. Khalil | Ziaur Rahman | M. Sumi
[1] Djamal Zeghlache,et al. Lightweight collaborative key establishment scheme for the Internet of Things , 2014, Comput. Networks.
[2] Sherali Zeadally,et al. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.
[3] Abraham Lempel,et al. A universal algorithm for sequential data compression , 1977, IEEE Trans. Inf. Theory.
[4] G. Álvarez,et al. Breaking parameter modulated chaotic secure communication system , 2003, nlin/0311041.
[5] L. Kocarev,et al. Logistic map as a block encryption algorithm , 2001 .
[6] Ramjee Prasad,et al. Proposed embedded security framework for Internet of Things (IoT) , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[7] July , 1890, The Hospital.
[8] Karan Singh,et al. Lightweight Security Scheme for Internet of Things , 2018, Wireless Personal Communications.
[9] M. Baptista. Cryptography with chaos , 1998 .
[10] L. Kocarev. Chaos-based cryptography: a brief overview , 2001 .
[11] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[12] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[13] P. J. Holmes,et al. Nonlinear Oscillations, Dynamical Systems, and Bifurcations of Vector Fields , 1983, Applied Mathematical Sciences.
[14] Jiguo Yu,et al. A Privacy Preserving Communication Protocol for IoT Applications in Smart Homes , 2016, 2016 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI).
[15] Jürgen Schönwälder,et al. Management of resource constrained devices in the internet of things , 2012, IEEE Communications Magazine.
[16] Zhi Chen,et al. A lightweight attribute-based encryption scheme for the Internet of Things , 2015, Future Gener. Comput. Syst..
[17] Ljupco Kocarev,et al. Differential and linear probabilities of a block-encryption cipher , 2003 .
[18] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[19] Author. $article.title , 2002, Nature.
[20] Ilias Maglogiannis,et al. Bringing IoT and Cloud Computing towards Pervasive Healthcare , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[21] Zhihan Lv,et al. Multimedia cloud transmission and storage system based on internet of things , 2017, Multimedia Tools and Applications.
[22] Z. Kotulski,et al. APPLICATION OF DISCRETE CHAOTIC DYNAMICAL SYSTEMS IN CRYPTOGRAPHY — DCC METHOD , 1999 .
[23] Jianqing Zhang,et al. Toward content-centric privacy in ICN: attribute-based encryption and routing , 2013, SIGCOMM 2013.
[24] Ali Newaz Bahar,et al. A Novel Structure of Advance Encryption Standard with 3-Dimensional Dynamic S-box and Key Generation Matrix , 2020, ArXiv.
[25] Subhas Chandra Mukhopadhyay,et al. Internet of Things: Challenges and Opportunities , 2014 .
[26] Hannu Tenhunen,et al. End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..
[27] In Lee,et al. The Internet of Things (IoT): Applications, investments, and challenges for enterprises , 2015 .
[28] Jinsheng Sun,et al. A block cipher based on a suitable use of the chaotic standard map , 2005 .
[29] Ahmet M. Kondoz,et al. Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption , 2017, 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[30] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[31] Jason Smith,et al. The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[32] J. Fridrich. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .
[33] Amtliches Mitteilungsblatt,et al. August , 1890, The Hospital.
[34] Saru Kumari,et al. An efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment , 2016, Ad Hoc Networks.