2024 Vol.7 Aug.N04 |
---|
|
Reference: [1] Rajasekar A , Karunakaran A , Sivakumaran C ,et al. An original data encryption technique for communication networks[J].International journal of electronic security and digital forensics: IJESDF, 2024, 16(1):73-83. [2] Patil A R , Borkar G M .Multimedia Data Transmission in MANETs Using the ACO-GWO Based AOMDV Protocol[J].Ad-hoc & sensor wireless networks, 2023,. 57(3/4):227-255. [3] Kanani P , Vartak P , Dabre K ,et al. Lightweight multi-level authentication scheme for secured data transmission in IoT-Fog context[J]. Combinatorial Optimization, 2023, 45(2):1-27. [4] Bhattacharjee S , Sharma H , Choudhury T ,et al. Publisher Correction to: leveraging chaos for enhancing encryption and compression in large cloud data transfers[J].The Journal of Supercomputing, 2024, 80(9):13493-13494. [5] Srinivasu L N , Veeramani V .Steganography using wavelet transform for secured data transmission[J].Journal of ambient intelligence and humanized computing, 2023, 14(7 Pt.2):9509-9527. [6] Sammeta N , Parthiban L .An optimal elliptic curve cryptography based encryption algorithm for blockchain-enabled medical image transmission[J]. Journal of Intelligent & Fuzzy Systems: applications in Engineering and Technology, 2022, 43(6):8275-8287. [7] Ren J , Liu B ,Wan, YibinZhu, XiaorongUllah, RahatMa, YimingWu, XiangyuMao, YayaSun, TingtingZhang, ChenfangShen, ShikuiWang, ZelinWang, Guangquan.Mode division multiplexing chaotic encryption scheme based on key intertwining and accompanying transmission[J].optics express, 2022,. 30(26):47896-47908. [8] Jiang L , Liu B ,Wu, XiangyuRen, JianxinUllah, RahatMao, YayaChen, ShuaidongXia, WenchaoZhao, LilongTian, Feng.High-security optical transmission system with multi-dimensional multiplexing based on quaternion chaotic encryption[J].optics express, 2023, 31(17):27711-27722. [9] Reddy M I , Reddy M P , Reddy R O ,et al. Improved elliptical curve cryptography and chaotic mapping with fruitfly optimization algorithm for secure data transmission[J].Wireless Networks, 2024, 30(3):1151-1164. [10] Karthikeyan S , Poongodi T .Secure Data Transmission in Smart Cities Using DNA Cryptography with LZW Compression Algorithm[J]. Instrumentation and Data Processing, 2024, 60(1):156-167. [11] Ebinazer S E , Savarimuthu N , Bhanu S M .A hybrid encryption for secure data deduplication the cloud[J].Int. J. Cloud Comput. 2023, 12:295-307. [12] Sun Y , Chatterjee P , Chen Y Z Y .Efficient Identity-Based Encryption With Revocation for Data Privacy in Internet of Things[J].IEEE internet of things journal, 2022, 9(4):2734-2743. [13] Jia R , Xin Y , Liu B ,et al. Dynamic Encryption and Secure Transmission of Terminal Data Files[J].Computers, materials & continua, 2022, 71(1 Pt.2):1221-1232. [14] Zhao C , Zhang Y , Xue Y ,et al. Encryption Transmission Verification Method of IT Operation and Maintenance Data Based on Fuzzy Clustering Analysis[J ].Mobile Networks and Applications, 2022, 27(4):1386-1396. [15] Cao H , Srivastava G .An Encryption Transmission System for High-speed Private Data Streams in Online Education in the Specialty of "Traffic Engineering"[J].Mobile Networks and Applications, 2023, 28(3):1007-1018.
|
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16