Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map (English)
- New search for: Nesa, Nashreen
- Further information on Nesa, Nashreen:
-
https://orcid.org/0000-0002-9979-4896
- New search for: Ghosh, Tania
- Further information on Ghosh, Tania:
-
https://orcid.org/0000-0002-8470-7622
- New search for: Banerjee, Indrajit
- New search for: Nesa, Nashreen
- Further information on Nesa, Nashreen:
-
https://orcid.org/0000-0002-9979-4896
- New search for: Ghosh, Tania
- Further information on Ghosh, Tania:
-
https://orcid.org/0000-0002-8470-7622
- New search for: Banerjee, Indrajit
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic map
-
Contributors:
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2019-01-01
-
Size:9 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 47
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Challenge-based collaborative intrusion detection networks under passive message fingerprint attack: A further analysisLi, Wenjuan / Kwok, Lam For et al. | 2019
- 8
-
A secure authentication protocol for wearable devices environment using ECCKumar, Devender / Grover, Harmanpreet Singh / Adarsh et al. | 2019
- 16
-
Improvement of (n, n)-multi-secret image sharing schemes based on Boolean operationsKabirirad, Saeideh / Eslami, Ziba et al. | 2019
- 28
-
A new DCT-based robust image watermarking method using teaching-learning-Based optimizationMoosazadeh, Mohammad / Ekbatanifard, Gholamhossein et al. | 2019
- 39
-
Detailed analysis and improvement of an efficient and secure identity-based public auditing for dynamic outsourced data with proxyZhao, Jining / Xu, Chunxiang / Chen, Kefei et al. | 2019
- 50
-
Secure distributed data geolocation scheme against location forgery attackZhao, Yinyuan / Yuan, Haoran / Jiang, Tao / Chen, Xiaofeng et al. | 2019
- 59
-
Privacy-preserving outsourced image feature extractionLi, Dongmei / Dong, Xiaolei / Cao, Zhenfu / Wang, Haijiang et al. | 2019
- 65
-
Design of compressed sensing fault-tolerant encryption scheme for key sharing in IoT Multi-cloudy environment(s)Zhang, Peng / Gao, Juntao / Jia, Wenjuan / Li, Xuelian et al. | 2019
- 78
-
Reversible data hiding in encrypted images with somewhat homomorphic encryption based on sorting block-level prediction-error expansionXiong, Lizhi / Dong, Danping et al. | 2019
- 86
-
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universeZhang, Yanhua / Hu, Yupu / Gan, Yong / Yin, Yifeng / Jia, Huiwen et al. | 2019
- 94
-
Enhanced AMBTC based data hiding method using hamming distance and pixel value differencingKumar, Rajeev / Kim, Dae-Soo / Jung, Ki-Hyun et al. | 2019
- 104
-
Heterogeneous deniable authentication and its application to e-voting systemsJin, Chunhua / Chen, Guanhua / Yu, Changhui / Zhao, Jianyang / Jin, Ying / Shan, Jinsong et al. | 2019
- 112
-
The language of biometrics: Analysing public perceptionsBuckley, Oliver / Nurse, Jason R.C. et al. | 2019
- 120
-
Privacy-preserving quantum multi-party computation based on circular structureDeng, Zhiliang / Zhang, Ying / Zhang, Xiaorui / Li, Lingling et al. | 2019
- 125
-
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage systemLiu, Yepeng / Ren, Yongjun / Ge, Chunpeng / Xia, Jinyue / Wang, Qirun et al. | 2019
- 132
-
A dual privacy-preservation scheme for cloud-based eHealth systemsWang, Xiaoliang / Bai, Liang / Yang, Qing / Wang, Liu / Jiang, Frank et al. | 2019
- 139
-
A proactive malicious software identification approach for digital forensic examinersAli, Muhammad / Shiaeles, Stavros / Clarke, Nathan / Kontogeorgis, Dimitrios et al. | 2019
- 156
-
An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacksDaniel, Renu Mary / Rajsingh, Elijah Blessing / Silas, Salaja et al. | 2019
- 173
-
Image encryption scheme based on a new secure variant of Hill cipher and 1D chaotic mapsEssaid, M. / Akharraz, I. / Saaidi, A. / Mouhib, et A. et al. | 2019
- 188
-
Designing digital image encryption using 2D and 3D reversible modular chaotic mapsBroumandnia, Ali et al. | 2019
- 199
-
A high capacity reversible data hiding scheme for encrypted covers based on histogram shiftingZhang, Ru / Lu, Chunjing / Liu, Jianyi et al. | 2019
- 208
-
Security analysis and classification of image secret sharingYan, Xuehu / Liu, Lintao / Lu, Yuliang / Gong, Qinghong et al. | 2019
- 217
-
A new user behavior evaluation method in online social networkYang, Min / Zhang, Shibin / Zhang, Hang / Xia, Jinyue et al. | 2019
- 223
-
Inside out - A study of users’ perceptions of password memorability and recallAlomari, Ruba / Martin, Miguel Vargas / MacDonald, Shane / Maraj, Amit / Liscano, Ramiro / Bellman, Christopher et al. | 2019
- 235
-
Efficient implementation of lightweight block ciphers on volta and pascal architectureLi, Pei / Zhou, Shihao / Ren, Bingqing / Tang, Shuman / Li, Ting / Xu, Chang / Chen, Jiageng et al. | 2019
- 246
-
A multiparty watermarking protocol for cloud environmentsFrattolillo, Franco et al. | 2019
- 258
-
Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storageLiang, Pengfei / Zhang, Leyou / Kang, Li / Ren, Juan et al. | 2019
- 267
-
Secure and efficient arithmetic-based multi-secret image sharing scheme using universal shareMeghrajani, Yogesh K. / Desai, Laxmi S. / Mazumdar, Himanshu S. et al. | 2019
- 275
-
A novel information hiding scheme based on social networking site viewers’ public commentsMahato, Susmita / Yadav, Dilip Kumar / Khan, Danish Ali et al. | 2019
- 284
-
An efficient multiple-user location-based query authentication approach for social networkingWang, Yong / Hassan, Abdelrhman / Duan, Xiaoran / Zhang, Xiaosong et al. | 2019
- 295
-
Conditional privacy-preserving authentication and key agreement scheme for roaming services in VANETsZhou, Yousheng / Long, Xingwang / Chen, Lvjun / Yang, Zheng et al. | 2019
- 302
-
A STAMP-based ontology approach to support safety and security analysesPereira, Daniel Patrick / Hirata, Celso / Nadjm-Tehrani, Simin et al. | 2019
- 320
-
Design of a chaos-based encryption scheme for sensor data using a novel logarithmic chaotic mapNesa, Nashreen / Ghosh, Tania / Banerjee, Indrajit et al. | 2019
- 329
-
Efficient identity-based multi-bit proxy re-encryption over lattice in the standard modelHou, Jinqiu / Jiang, Mingming / Guo, Yuyan / Song, Wangan et al. | 2019
- 335
-
Secure string pattern query for open data initiativeWang, Yong / Hassan, Abdelrhman / Liu, Fei / Guan, Yuanfeng / Zhang, Zhiwei et al. | 2019
- 353
-
Color image-spliced localization based on quaternion principal component analysis and quaternion skewnessWang, Jinwei / Li, Yangyang / Li, Jian / Luo, Xiangyang / Shi, Yun-Qing / Jha, Sunil Kr. et al. | 2019
- 363
-
A taxonomy of features for preventing identity deception in online communities and their estimated efficacyTsikerdekis, Michail / Morse, Taylor / Dean, Cari / Ruffin, Jason et al. | 2019
- 371
-
A progressively essential secret image sharing scheme using hierarchy shadowHu, Yan-Xiang / Liu, Yi-Ning et al. | 2019
- 377
-
A hybrid deep learning image-based analysis for effective malware detectionVenkatraman, Sitalakshmi / Alazab, Mamoun / Vinayakumar, R. et al. | 2019
- 390
-
An improved simple flexible cryptosystem for 3D objects with texture maps and 2D imagesMizher, Manal A. / Sulaiman, Riza / Abdalla, Ayman M. / Mizher, Manar A. et al. | 2019
- 410
-
A reformed grasshopper optimization with genetic principle for securing medical dataAnnie Alphonsa, M.M. / MohanaSundaram, N. et al. | 2019
- ii
-
Editorial Board| 2019