Analysis of Different Cryptographic Algorithms in Cloud-Based Multi-robot Systems
Author:
Publisher
Springer Nature Singapore
Link
https://link.springer.com/content/pdf/10.1007/978-981-19-5845-8_15
Reference25 articles.
1. Putra SD, Yudhiprawira M, Sutikno S, Kurniawan Y, Ahmad AS (2019) Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3. TELKOMNIKA Telecommun. Comput. Electron. Control. 17(3):1282–1289. https://doi.org/10.12928/TELKOMNIKA.V17I3.9384
2. Jain S, Doriya R (2022) Security framework to healthcare robots for secure sharing of healthcare data from cloud. Int J Inf Technol 1–11.https://doi.org/10.1007/s41870-022-00997-8
3. Hess E, Janssen N, Meyer B, Schütze T (2000) Information leakage attacks against smart card implementations of cryptographic algorithms and countermeasures–a survey. Eurosmart Secur. Conf. 130:55–64
4. Maniyath SR, Thanikaiselvan V (2020) An efficient image encryption using deep neural network and chaotic map. Microprocess Microsyst 77:103134. https://doi.org/10.1016/j.micpro.2020.103134
5. Chandra S, Paira S, Alam SS, Sanyal G (2014) A comparative survey of symmetric and asymmetric key cryptography. In: 2014 ınternational conference on electronics and communication computer engineering, ICECCE 2014, pp 83–93. https://doi.org/10.1109/ICECCE.2014.7086640
1.学者识别学者识别
2.学术分析学术分析
3.人才评估人才评估
"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370
www.globalauthorid.com
TOP
Copyright © 2019-2024 北京同舟云网络信息技术有限公司 京公网安备11010802033243号 京ICP备18003416号-3