This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Gupta, Purnima & Sinha, Amit & Srivastava, Prabhat & Perti, Ashwin & Singh, Aswani. (2021). Security Implementations in IoT Using Digital Signature. 10.1007/978-981-15-4692-1_40.GuptaPurnimaSinhaAmitSrivastavaPrabhatPertiAshwinSinghAswani2021Security Implementations in IoT Using Digital Signature10.1007/978-981-15-4692-1_40Open DOISearch in Google Scholar
Ferguson, Niels & Schneier, Bruce & Kohno, Tadayoshi. (2015). Message Authentication Codes. 10.1002/9781118722367.ch6.FergusonNielsSchneierBruceKohnoTadayoshi2015Message Authentication Codes10.1002/9781118722367.ch6Open DOISearch in Google Scholar
Galbally, Javier & Marcel, Sébastien & Fierrez, Julian. (2014). Biometric Antispoofing Methods: A Survey in Face Recognition. IEEE Access. 2. 1530–1552. 10.1109/ACCESS.2014.2381273.GalballyJavierMarcelSébastienFierrezJulian2014Biometric Antispoofing Methods: A Survey in Face RecognitionIEEE Access21530155210.1109/ACCESS.2014.2381273Open DOISearch in Google Scholar
(2021). One Time Password (OTP) Life Cycle and Challenges: Case Study. 10.1007/978-981-15-7961-5_13.2021One Time Password (OTP) Life Cycle and Challenges: Case Study10.1007/978-981-15-7961-5_13Open DOISearch in Google Scholar
Rubinstein-Salzedo, Simon. (2018). Zero-Knowledge Proofs. 10.1007/978-3-319-94818-8_16.Rubinstein-SalzedoSimon2018Zero-Knowledge Proofs10.1007/978-3-319-94818-8_16Open DOISearch in Google Scholar
Wollinger, Thomas & Kumar, Sandeep. (2006). Fundamentals of Symmetric Cryptography. 10.1007/3-540-28428-1_9.WollingerThomasKumarSandeep2006Fundamentals of Symmetric Cryptography10.1007/3-540-28428-1_9Open DOISearch in Google Scholar
Ranjan, Rajiv & Mukherjee, Abir & Rai, Pankaj & Ahmad, Khaleel. (2019). Asymmetric Cryptography. 10.1201/9781351021708-8.RanjanRajivMukherjeeAbirRaiPankajAhmadKhaleel2019Asymmetric Cryptography10.1201/9781351021708-8Open DOISearch in Google Scholar
Ferguson, Niels & Schneier, Bruce & Kohno, Tadayoshi. (2015). Block Ciphers. 10.1002/9781118722367.ch3.FergusonNielsSchneierBruceKohnoTadayoshi2015Block Ciphers10.1002/9781118722367.ch3Open DOISearch in Google Scholar
Bray, Shannon. (2020). Stream Ciphers and Block Ciphers. 10.1002/9781119612216.ch5.BrayShannon2020Stream Ciphers and Block Ciphers10.1002/9781119612216.ch5Open DOISearch in Google Scholar
Hawanna, Varsharani & Kulkarni, Vrushali & Rane, Rashmi & Mestri, P. & Panchal, S.. (2016). Risk Rating System of X.509 Certificates. Procedia Computer Science. 89. 152–161. 10.1016/j.procs.2016.06.027.HawannaVarsharaniKulkarniVrushaliRaneRashmiMestriP.PanchalS.2016Risk Rating System of X.509 CertificatesProcedia Computer Science8915216110.1016/j.procs.2016.06.027Open DOISearch in Google Scholar
Rhodes, Brandon & Goerzen, John. (2014). TLS/SSL. 10.1007/978-1-4302-5855-1_6.RhodesBrandonGoerzenJohn2014TLS/SSL10.1007/978-1-4302-5855-1_6Open DOISearch in Google Scholar
Ferrer, Marita & Gary Gutiérrez, Margarita & Hernández, Salvador. (2019). Representation of group isomorphisms I. Topology and its Applications. 263. 10.1016/j.topol.2019.05.023.FerrerMaritaGary GutiérrezMargaritaHernándezSalvador2019Representation of group isomorphisms ITopology and its Applications26310.1016/j.topol.2019.05.023Open DOISearch in Google Scholar
Jassim S.A., Farhan A.K., Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things (2022), International Journal of Electrical and Computer Engineering, 12 (3), pp. 3287–3297, DOI: 10.11591/ijece.v12i3.pp3287-3297JassimS.A.FarhanA.K.Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things2022International Journal of Electrical and Computer Engineering1233287329710.11591/ijece.v12i3.pp3287-3297Open DOISearch in Google Scholar
Shrihari M.R., Manjunath T.N., Archana R.A., Hegadi R.S., Development of Security Performance and Comparative Analyses Process for Big Data in Cloud (2022), 789, pp. 147–160.ShrihariM.R.ManjunathT.N.ArchanaR.A.HegadiR.S.Development of Security Performance and Comparative Analyses Process for Big Data in Cloud2022789147160Search in Google Scholar
Lopriore L., Cryptographic pointers for fine-grained file access security (2022), DOI: 10.1080/19393555.2022.2033365LoprioreL.Cryptographic pointers for fine-grained file access security202210.1080/19393555.2022.2033365Open DOISearch in Google Scholar
Susilabai S.S., Mahendran D.S., Peter S.J., A Trusted User Integrity-Based Privilege Access Control (UIPAC) for Secured Clouds (2022), 243, pp. 499–520, DOI: 10.1007/978-981-16-3675-2_38SusilabaiS.S.MahendranD.S.PeterS.J.A Trusted User Integrity-Based Privilege Access Control (UIPAC) for Secured Clouds202224349952010.1007/978-981-16-3675-2_38Open DOISearch in Google Scholar
Fan Q., Chen J., Shojafar M., Kumari S., He D., SAKE*: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things (2022), DOI: 10.1109/TII.2022.3145584FanQ.ChenJ.ShojafarM.KumariS.HeD.SAKE*: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things202210.1109/TII.2022.3145584Open DOISearch in Google Scholar
Liu X., Guo Z., Ma J., Song Y., A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX (2022), 9 (5), pp. 3533–3547, DOI: 10.1109/JIOT.2021.3097996LiuX.GuoZ.MaJ.SongY.A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX2022953533354710.1109/JIOT.2021.3097996Open DOISearch in Google Scholar
Liu X., Liu S., Han S., Gu D., Tightly CCAsecure inner product functional encryption scheme, (2022) Theoretical Computer Science, 898, pp. 1–19.LiuX.LiuS.HanS.GuD.Tightly CCAsecure inner product functional encryption scheme2022Theoretical Computer Science898119Search in Google Scholar