Hash Function Based Optimal Block Chain Model for the Internet of Things (IoT)
暂无分享,去创建一个
Andino Maseleno | Marini Othman | M. Ilayaraja | K. Shankar | P. Deepalakshmi | K. Shankar | M. Othman | P. Deepalakshmi | M. Ilayaraja | A. Maseleno
[1] Kartik Shankar,et al. Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm , 2018 .
[2] Mohamed Elhoseny,et al. An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.
[3] Jian Shen,et al. A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things , 2018, Secur. Commun. Networks.
[4] Seyedali Mirjalili,et al. Dragonfly algorithm: a new meta-heuristic optimization technique for solving single-objective, discrete, and multi-objective problems , 2015, Neural Computing and Applications.
[5] Joel J. P. C. Rodrigues,et al. Effective Features to Classify Big Data Using Social Internet of Things , 2018, IEEE Access.
[6] P. Eswaran,et al. RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique , 2016, J. Circuits Syst. Comput..
[7] K. R. Venugopal,et al. Network optimizations in the Internet of Things: A review , 2019, Engineering Science and Technology, an International Journal.
[8] K. Bennani,et al. Particle swarm optimization based clustering in wireless sensor networks: The effectiveness of distance altering , 2012, 2012 IEEE International Conference on Complex Systems (ICCS).
[9] Turki F. Al-Somani,et al. More secure Internet of Things using robust encryption algorithms against side channel attacks , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[10] Manuel Díaz,et al. On blockchain and its integration with IoT. Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[11] M. Prasanth,et al. Encryption and hash based security in Internet of Things , 2015, 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN).
[12] R. Balasubramanian,et al. Medical Image Security Using Dual Encryption with Oppositional Based Optimization Algorithm , 2018, Journal of Medical Systems.
[13] Zhou Jing,et al. Research on the basic characteristics, the key technologies, the network architecture and security problems of the Internet of things , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.
[14] Khaled Salah,et al. IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..
[15] Antônio A. de A. Rocha,et al. A Survey of How to Use Blockchain to Secure Internet of Things and the Stalker Attack , 2018, Secur. Commun. Networks.
[16] Andino Maseleno,et al. Nur algorithm on data encryption and decryption , 2018 .
[17] Mohamed Elhoseny,et al. Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.
[18] Amirhossein Safi,et al. Improving the security of internet of things using encryption algorithms , 2017, 2017 International Conference on IoT and Application (ICIOT).
[19] K. Shankar,et al. RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.
[20] Farookh Khadeer Hussain,et al. Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT) , 2018, Mobile Networks and Applications.
[21] Daniel Minoli,et al. Blockchain mechanisms for IoT security , 2018, Internet Things.