2020 Vol.3 Aug. No.4 |
---|
|
Reference: [1]Kumaresan S , Shanmugam V . Time-variant attribute-based multitype encryption algorithm for improved cloud data security using user profile[J]. The Journal of Supercomputing, 2020(76):6094–6112. [2]Bhardwaj, Rupali. Enhanced encrypted reversible data hIDing algorithm with minimum distortion through homomorphic encryption[J]. Journal of Electronic Imaging, 2018, 27(2):1-9. [3] Shuai Liu, Xinyu Liu, Shuai Wang, Khan Muhammad. Fuzzy-Aided Solution for Out-of-View Challenge in Visual Tracking under IoT Assisted Complex Environment. Neural Computing & Applications, 2021, 33(4): 1055-1065. [4]Hasheminejad A , Rostami M J . A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map[J]. Optik, 2019, 184:205-213. [5]Chai X , Zheng X , Gan Z , et al. An image encryption algorithm based on chaotic system and compressive sensing[J]. Signal Processing, 2018, 148(7):124-144. [6]Ayantika Chatterjee, Indranil SenGupta. Translating Algorithms to handle Fully Homomorphic Encrypted Data on the Cloud[J]. IEEE Transactions on Cloud Computing, 2018, 6(1):287-300. [7]Pujari S K , Bhattacharjee G , Bhoi S . A HybrIDized Model for Image Encryption through Genetic Algorithm and DNA Sequence[J]. Procedia Computer Science, 2018, 125:165-171. [8]Ghulam M , Muhammad T , Hanif S M . Energy Efficient Data Encryption Techniques in Smartphones[J]. Wireless Personal Communications, 2018, 106(11):2023-2035. [9]Gai K , Qiu M , Zhao H . Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud Computing[J]. IEEE Transactions on Big Data, 2017,18(5):1-1. [10] Zong J , Hajomer A A E , Zhang L , et al. Real-time secure optical OFDM transmission with chaotic data encryption[J]. Optics Communications, 2020, 473(15):126005. [11] Liu, S., Bai, W., Srivastava, G. et al. Property of Self-Similarity Between Baseband and Modulated Signals. Mobile Networks & Applications, 2020, 25(4): 1537-1547. [12]Bokhari M U , Shallal Q M , Tamandani Y K . Reducing the Required Time and Power for Data Encryption and Decryption Using K-NN Machine Learning[J]. IETE Journal of Research, 2019, 65(2):227-235. [13]Wang Y , Zhang W , Chen G , et al. Multi-Gbit/s real-time modems for chaotic optical OFDM data encryption and decryption[J]. Optics Communications, 2018, 432(9):39-43. [14]Angizi S , He Z , Bagherzadeh N , et al. Design and Evaluation of a Spintronic In-Memory Processing Platform for Nonvolatile Data Encryption[J]. 2018, 37(9):1788-1801. [15]Vengala D V K , Kavitha D , Kumar A P S . Secure data transmission on a distributed cloud server with the help of HMCA and data encryption using optimized CP-ABE-ECC[J]. Cluster Computing, 2020(5). [16] Shuai Liu. Introduction of Key Problems in Long-Distance Learning and Training, Mobile Networks and Applications, 2019, 24(1): 1-4. [17] Akgul A , Kacar S , Pehlivan I , et al. Chaos‐based encryption of multimedia data and design of security analysis interface as an educational tool[J]. Computer Applications in Engineering Education, 2018, 26(5):1336-1349. [18]Quang D V , Hoan T N K , Koo I . Energy-Efficient Data Encryption Scheme for Cognitive Radio Networks[J]. IEEE Sensors Journal, 2018, 10(1):2050-2059. [19] Sultan A , Yang X , Hajomer A A E , et al. Chaotic Constellation Mapping for Physical-Layer Data Encryption in OFDM-PON[J]. IEEE Photonics Technology Letters, 2018, 4(1):339-342. [20]Bai T , Lin J , Li G , et al. A lightweight method of data encryption in BANs using electrocardiogram signal[J]. Future Generation Computer Systems, 2018, 92(3):800-811. [21] Chen H , Yang X , Hu W . Chaotic reconfigurable ZCMT precoder for OFDM data encryption and PAPR reduction[J]. Optics Communications, 2017, 405(15):12-16. [22]Puthal D , Wu X , Nepal S , et al. SEEN: A Selective Encryption Method to Ensure ConfIDentiality for Big Sensing Data Streams[J]. IEEE Transactions on Big Data, 2017, 8(5):379-392. [23] Qin Y , Zhang Y . Information Encryption in Ghost Imaging With Customized Data Container and XOR Operation[J]. IEEE Photonics Journal, 2017, 31(3):7802208. [24]Liu W , Liu J , Wu Q , et al. Efficient subtree-based encryption for fuzzy-entity data sharing[J]. Soft Computing, 2018, 22(4):7961-7976. [25]Li H , Yang Y , Dai Y , et al. Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data[J]. IEEE Transactions on Cloud Computing, 2020, 8(2):484-494.
|
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16