Author:
Zolfaghari Behrouz,Bibak Khodakhast
Publisher
Springer International Publishing
Reference307 articles.
1. M. Iwamoto, K. Ohta, J. Shikata, Security formalizations and their relationships for encryption and key agreement in information-theoretic cryptography. IEEE Trans. Inform. Theory 64(1), 654–685 (2018)
2. F. Oggier, M. J. Mihaljević, An information-theoretic security evaluation of a class of randomized encryption schemes. IEEE Trans. Inform. Forensics Secur. 9(2), 158–168 (2014)
3. S.B. Sadkhan, D.M. Reda, A proposed security evaluator for cryptosystem based on information theory and triangular game, in Proceedings of International Conference on Advanced Science and Engineering (ICOASE) (Duhok, Iraq, 2018)
4. T. Gebremichael, U. Jennehag, M. Gidlund, Lightweight IoT group key establishment scheme from the one time pad, in Proceedings of 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud) (Newark, CA, USA, 2019)
5. S. Naskar, T. Zhang, G. Hancke, M. Gidlund, OTP-based symmetric group key establishment scheme for IoT networks, in Proceedings of 47th Annual Conference of the IEEE Industrial Electronics Society (Toronto, ON, Canada, 2021)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献