A Bio-Inspired Algorithm for Symmetric Encryption
暂无分享,去创建一个
Abdelkrim Latreche | Kadda Benyahia | Meftah Mustapha | A. Latreche | Kadda Benyahia | Meftah Mustapha
[1] Richard Chbeir,et al. Intelligent and Knowledge-Based Computing for Business and Organizational Advancements , 2012 .
[2] John H. Reif,et al. DNA-based Cryptography , 1999, Aspects of Molecular Computing.
[3] Victor I. Chang,et al. Semantic keyword searchable proxy re‐encryption for postquantum secure cloud storage , 2017, Concurr. Comput. Pract. Exp..
[4] O. Tornea,et al. Security and complexity of a DNA-based cipher , 2013, 2013 11th RoEduNet International Conference.
[5] Lei Qin,et al. Asymmetric encryption and signature method with DNA technology , 2010, Science China Information Sciences.
[6] Victor I. Chang,et al. Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system , 2018, Inf. Sci..
[7] Priyanka Bhatia,et al. Framework for Wireless Network Security using Quantum Cryptography , 2014, ArXiv.
[8] Gerard Briscoe,et al. The Computing of Digital Ecosystems , 2010, Int. J. Organ. Collect. Intell..
[9] Akimitsu Okamoto,et al. Public-key system using DNA as a one-way function for key distribution. , 2005, Bio Systems.
[10] Yanfeng Wang,et al. An encryption scheme using DNA technology , 2008, 2008 3rd International Conference on Bio-Inspired Computing: Theories and Applications.
[11] Zakaria Maamar,et al. CSMA: Context-Based, Service-Oriented Modeling and Analysis Method for Modern Enterprise Applications , 2010, Int. J. Organ. Collect. Intell..
[12] L M Adleman,et al. Molecular computation of solutions to combinatorial problems. , 1994, Science.
[13] P D Kaplan,et al. DNA solution of the maximal clique problem. , 1997, Science.
[14] Victor I. Chang,et al. DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation , 2017, Journal of Medical Systems.
[15] R J Lipton,et al. DNA solution of hard computational problems. , 1995, Science.
[16] Magdy Saeb,et al. A DNA-based implementation of YAEA encryption algorithm , 2006, Computational Intelligence.
[17] Anil Kumar Verma,et al. DNA cryptography: a novel paradigm for secure routing in Mobile Ad hoc Networks (MANETs) , 2008 .
[18] Grzegorz Rozenberg,et al. DNA Computing: New Ideas and Paradigms , 1999, ICALP.
[19] Richard J. Lipton,et al. DNA Based Computers , 1996 .
[20] Amine Boudia,et al. Hybridization Between Scoring Technique and Similarity Technique for Automatic Summarization by Extraction , 2016, Int. J. Organ. Collect. Intell..
[21] David Pointcheval,et al. About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations) , 2004, Selected Areas in Cryptography.
[22] Victor Chang. Cloud Bioinformatics in a Private Cloud Deployment , 2013 .
[23] Victor I. Chang,et al. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..
[24] Monika Mital,et al. Implementing Software as a Service-Based E-Governance Solution: A Network Governance Perspective , 2014, Int. J. Organ. Collect. Intell..