Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference50 articles.
1. Bhattacharjya, A., Zhong, X., & Li, X. (2019). A Lightweight and efficient secure hybrid RSA (SHRSA) messaging scheme with four-layered authentication stack. IEEE Access, 7, 30487–30506.
2. Yu, R., Wang, J., Xu, T., Gao, J., An, Y., Zhang, G., & Yu, M. (2017). Authentication with block-chain algorithm and text encryption protocol in calculation of social network. IEEE Access, 5, 24944–24951.
3. Wong, C. K., Gouda, M., & Lam, S. S. (2000). Secure group communications using key graphs. IEEE/ACM Transactions on Networking, 8, 16–30.
4. Cao, N., Wang, C., Li, M., Ren, K., & Lou, W. (2014). Privacy-preserving multi-keyword ranked search over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 25, 222–233.
5. Kamil, I.A., Ogundoyin, S.O. (2018) EPDAS: Efficient privacy-preserving data analysis scheme for smart grid network. Journal of King Saud University-Computer and Information Sciences.