A Hybrid Cryptographic System for Secured Device to Device Communication
暂无分享,去创建一个
[1] Hyunsoo Kwon,et al. Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks , 2016, Multimedia Tools and Applications.
[2] Jonathan Knudsen. Java cryptography , 1998, Java series.
[3] Edoardo Persichetti. Secure and Anonymous Hybrid Encryption from Coding Theory , 2013, PQCrypto.
[4] Gary Steri,et al. Connectivity and security in a D2D communication protocol for public safety applications , 2014, 2014 11th International Symposium on Wireless Communications Systems (ISWCS).
[5] Jeffrey G. Andrews,et al. Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.
[6] Yu Cheng,et al. Secure key establishment for Device-to-Device communications , 2014, 2014 IEEE Global Communications Conference.
[7] M.I. Aziz,et al. Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.
[8] Srinivasan Nagaraj,et al. A Bio-Crypto Protocol for Password Protection Using ECC , 2015 .
[9] Sunil Mane,et al. Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA , 2013 .
[10] Emad Abd-Elrahman,et al. D2D group communications security , 2015, 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS).
[11] James L. Massey,et al. Some applications of source coding in cryptography , 2010, Eur. Trans. Telecommun..
[12] Dingding Jia,et al. Related-Key Security for Hybrid Encryption , 2014, ISC.
[13] Trung Quang Duong,et al. Secure D2D communication in large-scale cognitive cellular networks with wireless power transfer , 2015, 2015 IEEE International Conference on Communications (ICC).
[14] Hossam Afifi,et al. Fast group discovery and non-repudiation in D2D communications using IBE , 2015, 2015 International Wireless Communications and Mobile Computing Conference (IWCMC).
[15] Ronald L. Rivest,et al. On breaking a Huffman code , 1996, IEEE Trans. Inf. Theory.
[16] K Tejaswi,et al. Ortho Linear Feedback Shift Register Cryptographic System , 2015 .
[17] Chandrashekhar Meshram,et al. Discrete Logarithm and Integer Factorization using ID-based Encryption , 2015 .