Author:
Tran Dang Ninh,Nguyen Tien Xuan,Nguyen Xuan Thu,Le Viet Phuong
Publisher
Springer Nature Singapore
Reference15 articles.
1. Advanced Encryption Standard (AES). Federal Information Processing Standards Publication 197, National Institute of Standards and Technology, Gaithersburg, MD, USA (2001)
2. Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., Ayaz, M.: A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access 9, 57792–57807 (2021). https://doi.org/10.1109/ACCESS.2021.3073203
3. Dolmatov, V., Baryshkov, D.: GOST R 34.12-2015: Block Cipher “Magma”. Request for Comments 8891, Internet Engineering Task Force (2020)
4. Dworkin, M.: Recommendation for Block Cipher Modes of Operation: Methods and Techniques. Federal Information Processing Standards Publication 8000-38A, National Institute of Standards and Technology, Gaithersburg, MD, USA (2001)
5. Fan, X., Zhong, Z., Chai, Q., Guo, D.: Ucam: a user-centric, blockchain-based and end-to-end secure home IP camera system. In: Security and Privacy in Communication Networks, pp. 311–323. Washington, DC, USA (2020)