Intelligent security algorithm for UNICODE data privacy and security in IOT
暂无分享,去创建一个
Gunasekaran Manogaran | Balajee Maram | J. M. Gnanasekar | Muthu Balaanand | M. Balaanand | Gunasekaran Manogaran | Balajee Maram | J. Gnanasekar | B. Maram | M. Balaanand
[1] Muhammad Reza Z'aba,et al. Key-dependent s-box in lightweight block ciphers , 2014 .
[2] Dragos Trinca,et al. Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography , 2006, Third International Conference on Information Technology: New Generations (ITNG'06).
[3] Kazys Kazlauskas,et al. Key-Dependent S-Box Generation in AES Block Cipher System , 2009, Informatica.
[4] Hristina Mihajloska,et al. A NEW APPROACH INTO CONSTRUCTING S-BOXES FOR LIGHTWEIGHT BLOCK CIPHERS , 2014 .
[5] Carlisle M. Adams,et al. The structured design of cryptographically good s-boxes , 1990, Journal of Cryptology.
[6] Mohammad Shirali-Shahreza,et al. STEGANOGRAPHY IN PERSIAN AND ARABIC UNICODE TEXTS USING PSEUDO-SPACE AND PSEUDO CONNECTION CHARACTERS , 2008 .
[7] Nitin Agrawal,et al. A block based Encryption Model to improve Avalanche Effect for data Security , 2013 .
[8] J. M. Gnanasekar,et al. Unicode Text Security Using Dynamic and Key-Dependent 16x16 S-Box , 2016 .
[9] Mohamed Abdel-Basset,et al. 2-Levels of clustering strategy to detect and locate copy-move forgery in digital images , 2018, Multimedia Tools and Applications.
[10] Prasenjit Choudhury,et al. MULET: A Multilanguage Encryption Technique , 2010, 2010 Seventh International Conference on Information Technology: New Generations.
[11] P. Mroczkowski,et al. Generating Pseudorandom S-Boxes - a Method of Improving the Security of Cryptosystems Based on Block Ciphers , 2009 .
[12] Pratosh Bansal,et al. An improved cryptographic algorithm using UNICODE and universal colors , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).
[13] José María Sierra,et al. Genetic Cryptoanalysis of Two Rounds TEA , 2002, International Conference on Computational Science.
[14] Ajeet Singh. A New Approach to Enhance Avalanche Effect in Aes to ImproveComputer Security , 2015 .
[15] Sajad Shirali-Shahreza,et al. Persian/Arabic Unicode Text Steganography , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[16] Mohamed Abdel-Basset,et al. An improved nature inspired meta-heuristic algorithm for 1-D bin packing problems , 2018, Personal and Ubiquitous Computing.
[17] Maram Balajee. UNICODE and Colors Integration tool for Encryption and Decryption , 2011 .
[18] Naveen K. Chilamkurti,et al. Three-way decisions based on neutrosophic sets and AHP-QFD framework for supplier selection problem , 2018, Future Gener. Comput. Syst..
[19] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .
[20] Tariq Shah,et al. Comparative Analysis of S-boxes Based on Graphical SAC , 2010 .
[21] Mohamed Abdel-Basset,et al. A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem , 2018, Future Gener. Comput. Syst..
[22] Yong Wang,et al. Analyses of SKIPJACK S-Box , 2011 .
[23] Amritha Thekkumbadan Veetil. An Encryption Technique Using Genetic Operators , 2015 .
[24] Mohamed Abdel-Basset,et al. Internet of Things (IoT) and its impact on supply chain: A framework for building smart, secure and efficient systems , 2018, Future Gener. Comput. Syst..
[25] Kazys Kazlauskas,et al. An Algorithm for Key-Dependent S-Box Generation in Block Cipher System , 2015, Informatica.
[26] Felicisimo V. Wenceslao,et al. Performance Efficiency of Modified AES Algorithm Using Multiple S-Boxes , 2015 .
[27] Sharad Jash,et al. A Cryptography Algorithm Using the Operations of Genetic Algorithm & Pseudo Random Sequence Generating Functions , 2014 .
[28] Mohamed Abdel-Basset,et al. Internet of things in smart education environment: Supportive framework in the decision‐making process , 2019, Concurr. Comput. Pract. Exp..
[29] KokSheik Wong,et al. UniSpaCh: A text-based data hiding method using Unicode space characters , 2012, J. Syst. Softw..
[30] Charles P. Pfleeger,et al. Security in computing , 1988 .
[31] M.A. Rahman,et al. A new approach to sort Unicode Bengali text , 2008, 2008 International Conference on Electrical and Computer Engineering.
[32] Jayant P. Bhoge,et al. Avalanche Effect of AES Algorithm , 2014 .
[33] Mohamed Abdel-Basset,et al. A hybrid approach of neutrosophic sets and DEMATEL method for developing supplier selection criteria , 2018, Des. Autom. Embed. Syst..
[34] Mohamed Abdel-Basset,et al. A novel method for solving the fully neutrosophic linear programming problems , 2018, Neural Computing and Applications.
[35] Jogeswar Tripathy,et al. Odia Offline Typewritten Character Recognition using Template Matching with Unicode Mapping , 2015, 2015 International Symposium on Advanced Computing and Communication (ISACC).
[36] Mohamed Abdel-Basset,et al. A comprehensive review of quadratic assignment problem: variants, hybrids and applications , 2018, Journal of Ambient Intelligence and Humanized Computing.
[37] Pedro Isasi,et al. Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA , 2004 .
[38] Rahul Sharma,et al. Universal Encryption Algorithm using Logical Operations and Bits Shuffling for Unicode , 2015 .
[39] Balajee Maram,et al. A Block Cipher Algorithm to Enhance the Avalanche Effect Using Dynamic Key- Dependent S-Box and Genetic Operations , 2018 .
[40] Iqtadar Hussain,et al. A novel design for the construction of safe S-boxes based on TDERC sequence , 2015 .