Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference11 articles.
1. Sethi PC, Behera PK (2015) Methods of network security and improving the quality of service—a survey. Int J Adv Res Comput Sci Softw Eng 5(7):1098–1106
2. Dubai MJ, Mahesh TR, Ghosh PA (2011) Design of new security algorithm: using hybrid Cryptography architecture. In: 2011 3rd international conference on electronics computer technology, Kanyakumari, India, pp 99–101. https://doi.org/10.1109/ICECTECH.2011.5941965
3. Sheu T-F, Huang N-F, Lee H-P (2010) In-depth packet inspection using a hierarchical pattern matching algorithm. IEEE Trans Depend Secure Comput 7(2):175–188
4. William S (2006) Cryptography and network security-principle and practices, elliptic curve cryptography, 4th edn. PHI Publisher, pp 310–313
5. Sethi PC, Behera PK (2014) Secure packet inspection using hierarchical pattern matching implemented using incremental clustering algorithm, December 22–24, ICHPCA-2014 (IEEE international conference)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Hierarchical signature scheme based on elliptic curve digital signature algorithm;International Journal of Information Technology;2024-06-19
2. Securing IoT Data: A Hybrid Cryptographic Approach;2024 11th International Conference on Computing for Sustainable Global Development (INDIACom);2024-02-28
3. A Robust and Fast Symmetric Text Encryption Algorithm Based on Fermat's Two Squares Theorem;2023 International Conference on Recent Advances in Electrical, Electronics, Ubiquitous Communication, and Computational Intelligence (RAEEUCCI);2023-04-19
4. IoT-based secure luggage storage kiosk;International Journal of Information Technology;2023-04
5. Improved resilience of secret sharing scheme with augmented multifarious features;International Journal of Information Technology;2022-05-14