共 50 条
- [31] A secure data deletion scheme for IoT devices through key derivation encryption and data analysis FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 741 - 753
- [32] An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4059 - 4079
- [34] A low redundancy data collection scheme to maximize lifetime using matrix completion technique EURASIP Journal on Wireless Communications and Networking, 2019
- [35] PROFICIENT KEY MANAGEMENT SCHEME FOR MULTICAST GROUPS USING GROUP KEY AGREEMENT AND BROADCAST ENCRYPTION 2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
- [36] Secret Sharing Scheme for Image Encryption Using New Transformation Matrix INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 647 - +
- [37] Generation of Key Matrix for Hill Cipher Encryption Using Classical Cipher 2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 51 - 54
- [38] A new method of generating public key matrix and using it for image encryption 2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 453 - 458