Author:
Bokhari Mohammad Ubaidullah,Afzal Shahnwaz,Yadav Gaurav
Publisher
Springer Science and Business Media LLC
Reference24 articles.
1. Tawalbeh L, Muheidat F, Tawalbeh M, Quwaider M (2020) IoT privacy and security: challenges and solutions. Appl Sci. https://doi.org/10.3390/APP10124102
2. Abdullah AM (2017) Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptogr Netw Secur https://www.researchgate.net/publication/317615794
3. Noura H, Chehab A, Sleem L, Noura M, Couturier R, Mansour MM (2018) One round cipher algorithm for multimedia IoT devices. Multimed Tools Appl 77(14):18383–18413. https://doi.org/10.1007/s11042-018-5660-y
4. Hell M, Johansson T, Meier W (2007) Grain: a stream cipher for constrained environments. Int J Wirel Mob Comput 2(1):86–93. https://doi.org/10.1504/IJWMC.2007.013798
5. Hell M, Johansson T, Maximov A, Meier W (2006) A stream cipher proposal: grain-128. In: IEEE Int. Symp. Inf. Theory—Proc., pp. 1614–1618, https://doi.org/10.1109/ISIT.2006.261549