Symmetric Key and Polynomial Based Key Generation Mechanism for Secured Data Communications in 5G Networks
暂无分享,去创建一个
[1] Ganapathy Sannasi,et al. Secured data storage and retrieval using elliptic curve cryptography in cloud , 2021, Int. Arab J. Inf. Technol..
[2] Lixiang Li,et al. Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks , 2017, IEEE Transactions on Biomedical Circuits and Systems.
[3] Wolfgang Kellerer,et al. Automatic intent-based secure service creation through a multilayer SDN network orchestration , 2018, IEEE/OSA Journal of Optical Communications and Networking.
[4] Bin Li,et al. Mimic Encryption System for Network Security , 2018, IEEE Access.
[5] Arputharaj Kannan,et al. Chinese remainder theorem based centralised group key management for secure multicast communication , 2014, IET Inf. Secur..
[6] Arputharaj Kannan,et al. Centralized key distribution protocol using the greatest common divisor method , 2013, Comput. Math. Appl..
[7] Victor Lopez,et al. Virtual network function deployment and service automation to provide end-to-end quantum encryption , 2018, IEEE/OSA Journal of Optical Communications and Networking.
[8] Riccardo Muradore,et al. Energy-Efficient Intrusion Detection and Mitigation for Networked Control Systems Security , 2015, IEEE Transactions on Industrial Informatics.
[9] Xiaoping Li,et al. TrustR: An Integrated Router Security Framework for Protecting Computer Networks , 2016, IEEE Communications Letters.
[10] Kamaljit Singh Bhatia,et al. A novel chaos-based encryption approach for future-generation passive optical networks using SHA-2 , 2017, IEEE/OSA Journal of Optical Communications and Networking.
[11] Jin Cao,et al. EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks , 2018, J. Netw. Comput. Appl..
[12] Chun-Kit Chan,et al. A Real-Valued Chaotic Orthogonal Matrix Transform-Based Encryption for OFDM-PON , 2018, IEEE Photonics Technology Letters.
[13] Vallipuram Muthukkumarasamy,et al. An Encryption Scheme Using Chaotic Map and Genetic Operations for Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[14] Shuai Liu,et al. Fractal Intelligent Privacy Protection in Online Social Network Using Attribute-Based Encryption Schemes , 2018, IEEE Transactions on Computational Social Systems.
[15] Arputharaj Kannan,et al. Dual Authentication and Key Management Techniques for Secure Data Transmission in Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[16] Guangjun Liu,et al. Low-complexity secure network coding against wiretapping using intra/inter-generation coding , 2015 .
[17] Xia Feng,et al. S2PD: A Selective Sharing Scheme for Privacy Data in Vehicular Social Networks , 2018, IEEE Access.
[18] Yang Liu,et al. SEDEA: State Estimation-Based Dynamic Encryption and Authentication in Smart Grid , 2017, IEEE Access.
[19] Satyajayant Misra,et al. Security, Privacy, and Access Control in Information-Centric Networking: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[20] Josep Domingo-Ferrer,et al. Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts , 2016, IEEE Transactions on Computers.
[21] Ahmed A. Abd El-Latif,et al. Secure Data Encryption Based on Quantum Walks for 5G Internet of Things Scenario , 2020, IEEE Transactions on Network and Service Management.