Improved Classical Cipher for Healthcare Applications
暂无分享,去创建一个
[1] Menezes Bernard. Network Security and Cryptography , 2010 .
[2] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[3] A. Trad,et al. Performance evaluation of encryption algorithm for wireless sensor networks , 2012, 2012 International Conference on Information Technology and e-Services.
[4] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[5] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .
[6] Y. Rangel-Romero,et al. Comments on “How to repair the Hill cipher” , 2008 .
[7] Abolfazl Falahati,et al. A secure variant of the Hill Cipher , 2009, 2009 IEEE Symposium on Computers and Communications.
[8] Muhammad Osama,et al. Assessing acceptability of hypertensive/diabetic patients towards mobile health based behavioral interventions in Pakistan: A pilot study , 2015, Int. J. Medical Informatics.
[9] Athanasios V. Vasilakos,et al. A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues , 2015, J. Netw. Comput. Appl..
[10] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[11] William Stallings,et al. Network security essentials - applications and standards (2. ed.) , 2003 .
[12] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[13] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[14] Shahrokh Saeednia. HOW TO MAKE THE HILL CIPHER SECURE , 2000, Cryptologia.
[15] Mohammed Amin,et al. How to repair the Hill cipher , 2006 .
[16] Chris W. Johnson,et al. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template , 2015, Int. J. Medical Informatics.
[17] Jeffrey Overbey,et al. ON THE KEYSPACE OF THE HILL CIPHER , 2005, Cryptologia.
[18] Nikolaos G. Bourbakis,et al. A Survey on Wearable Sensor-Based Systems for Health Monitoring and Prognosis , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[19] Kyung-Sup Kwak,et al. The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.
[20] David Samyde,et al. Side channel cryptanalysis , 2002 .